Hybridization of computational intelligence methods for attack detection in computer networks

作者: A. Branitskiy , I. Kotenko

DOI: 10.1016/J.JOCS.2016.07.010

关键词: Set (abstract data type)Machine learningSignature (logic)Data miningArtificial intelligenceComputer scienceNetwork securityArtificial neural networkComputational intelligenceSupport vector machineIdentification (information)Basis (linear algebra)

摘要: Abstract The paper is devoted to identification and classification of network traffic connections by various hybridization schemes with the goal efficient attack detection. For this purpose combination different methods computational intelligence used, namely neural networks, immune systems, neuro-fuzzy classifiers support vector machines. To increase speed processing input vectors it proposed apply method principal components. A distinctive feature advantage approach suggested a multi-level analysis traffic, providing possibility detect attacks signature based technique combining set adaptive detectors on methods. describes software tool that built basis mechanisms. Computational experiments were carried out serve as evidence their effectiveness in detection both known unknown attacks.

参考文章(45)
Reza Monsefi, Mohsen Kahani, Adel Nadjaran Toosi, Intrusion Detection Based on Neuro Fuzzy Classification international conference on computing informatics. ,(2006)
Mohd Aizaini Maarof, Siti Mariyam Shamsuddin, Anazida Zainal, Ensemble classifiers for network intrusion detection system Dynamic Pub.. ,(2009)
B. M. Aslahi-Shahri, R. Rahmani, M. Chizari, A. Maralani, M. Eslami, M. J. Golkar, A. Ebrahimi, A hybrid method consisting of GA and SVM for intrusion detection system Neural Computing and Applications. ,vol. 27, pp. 1669- 1676 ,(2016) , 10.1007/S00521-015-1964-2
Thomas Stibor, Jonathan Timmis, Claudia Eckert, A comparative study of real-valued negative selection to statistical anomaly detection techniques international conference on artificial immune systems. pp. 262- 275 ,(2005) , 10.1007/11536444_20
Iwan Syarif, Ed Zaluska, Adam Prugel-Bennett, Gary Wills, Application of bagging, boosting and stacking to intrusion detection machine learning and data mining in pattern recognition. pp. 593- 602 ,(2012) , 10.1007/978-3-642-31537-4_46
Peter J. Bentley, Jungwon Kim, An evaluation of negative selection in an artificial immune system for network intrusion detection genetic and evolutionary computation conference. pp. 1330- 1337 ,(2001)
Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham, Intrusion Detection Using Ensemble of Soft Computing Paradigms Springer, Berlin, Heidelberg. pp. 239- 248 ,(2003) , 10.1007/978-3-540-44999-7_23
Jerne Nk, Towards a network theory of the immune system. Annales De L'institut Pasteur. Immunologie. ,vol. 125, pp. 373- 389 ,(1974)
Jalal Rezaeenour, Mohammad Amini, Esmaeil Hadavandi, Effective Intrusion Detection with a Neural Network Ensemble Using Fuzzy Clustering and Stacking Combination Method Journal of Computing and Security. ,vol. 1, pp. 293- 305 ,(2015)