A novel Chaotic Flower Pollination-based intrusion detection framework

作者: Amrit Pal Singh , Arvinder Kaur , Saibal Kumar Pal

DOI: 10.1007/S00500-020-04937-1

关键词:

摘要: With the rise of network on handheld devices, security has become critical issue. Intrusion detection system is used to predict intrusive packets network; two-step procedure been intrusion, i.e., feature selection and then classification. Firstly, unwanted expandable features in data lead classification problem which affect decision capability classifiers, so we need optimize technique. Feature technique this paper based correlation information known as correlation-based (CFS). In paper, CFS’s search algorithm implemented using Chaotic Flower Pollination Algorithm (CFPA) that logically selects most favorable for referred CFPA-CFS. Further, hybridization CFPA support vector machine classifier named CFPSVM. Finally, novel IDS framework uses CFPA-CFS CFPSVM sequence intrusion. performance proposed evaluated two intrusion evaluation datasets, namely KDDCup99 NSL-KDD. The results demonstrate contributes more achieve better accuracy compared with state-of-the-art methods.

参考文章(61)
Ja Jabez, BJPCS Muthukumar, None, Intrusion Detection System (IDS): Anomaly Detection Using Outlier Detection Approach Procedia Computer Science. ,vol. 48, pp. 338- 346 ,(2015) , 10.1016/J.PROCS.2015.04.191
M. Hall, Correlation-based Feature Selection for Machine Learning PhD Thesis, Waikato Univer-sity. ,(1998)
Wathiq Laftah Al-Yaseen, Zulaiha Ali Othman, Mohd Zakree Ahmad Nazri, Hybrid Modified K-Means with C4.5 for Intrusion Detection Systems in Multiagent Systems. The Scientific World Journal. ,vol. 2015, pp. 294761- 294761 ,(2015) , 10.1155/2015/294761
Bing Xue, Mengjie Zhang, Will N. Browne, Particle swarm optimisation for feature selection in classification soft computing. ,vol. 18, pp. 261- 276 ,(2014) , 10.1016/J.ASOC.2013.09.018
陳佩君, Support Vector Machines ,(2008)
Asim Karim, Computational Intelligence for Network Intrusion Detection: Recent Contributions Computational Intelligence and Security. pp. 170- 175 ,(2005) , 10.1007/11596448_25
Iztok Fister, Matjaž Perc, Salahuddin M. Kamal, Iztok Fister, A review of chaos-based firefly algorithms Applied Mathematics and Computation. ,vol. 252, pp. 155- 165 ,(2015) , 10.1016/J.AMC.2014.12.006
A. K. Jain, M. N. Murty, P. J. Flynn, Data clustering: a review ACM Computing Surveys. ,vol. 31, pp. 264- 323 ,(1999) , 10.1145/331499.331504