Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Fuzzifying Intrusion Detection Systems with Modified Artificial Bee Colony and Support Vector Machine Algorithms

  • Chapter
  • First Online:
New Horizons for Fuzzy Logic, Neural Networks and Metaheuristics

Part of the book series: Studies in Computational Intelligence ((SCI,volume 1149))

  • 156 Accesses

Abstract

Corporate networks are popular targets for hackers, either to be spied on, steal trade secrets or to extort money by encrypting data. Possible safeguards are intrusion detection systems (IDS) which try to detect attacks by analyzing network traffic. This traffic is inherently vague and usually can not be classified unambiguously into attacks or normal data flow. A fuzzy classification system creates a more accurate representation by using membership degrees for the sets of attack data and normal data. However, research combining IDS and fuzzy architecture has been minimal. This paper explores a fuzzy approach to IDS. We give a comprehensive overview of recent studies, analyze how those solutions were built and compare them using the metrics accuracy, detection rate and false alarm rate. We further propose two new IDS models: One using a fuzzy Artificial Bee Colony and the other the Intuitionistic Fuzzy Twin Support Vector Machine algorithm. The two models and their combination are benchmarked by classifying the test data sets KDD99, NSL-KDD, UNSW-NB15 and CSE-CIC-IDS2018 and then compared to the studies from our literature review. Our results show that they can produce comparable results and more transparency when detecting attack patterns in network traffic. This suggests that fuzzy engineering could contribute to creating more resilient IDS.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 159.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    The projects source code is available at https://github.com/rafibu/intrusion_detection_system.

References

  1. The rbf kernel in svm: A complete guide. https://www.pycodemates.com/2022/10/the-rbf-kernel-in-svm-complete-guide.html. Accessed 29 May 2023

  2. Al-Nashif, Y., Kumar, A., Hairi, S.: Multi-level intrusion detection system (ml-ids). In: International Conference on Automonic Computing

    Google Scholar 

  3. Alazzam, H., Sharieh, A., Sabri, K.E.: A feature selection algorithm for intrusion detection system based on pigeon inspired optimizer. Expert Syst. Appl. (2020)

    Google Scholar 

  4. Aljawarneh, S., Aldwairi, M., Yassein, M.B.: Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. J. Comput. Sci. (2018)

    Google Scholar 

  5. Altwaijry, H., Algarny, S.: Multi-layer Bayesian based intrusion detection system. J. King Saud Univ. Comput. Inf. Sci. (2011)

    Google Scholar 

  6. Andresini, G., Appica, A., Malerba, D.: Autoencoder-based deep metric learning for network intrusion detection. Inf. Sci. (2021)

    Google Scholar 

  7. Andresini, G., Appice, A., Malerba, D.: Nearest cluster-based intrusion detection through convolutional neural networks. Knowl. Based Syst. (2021)

    Google Scholar 

  8. Choras, M., Pawlicki, M.: Intrusion detection approach based on optimised artificial neural network. Neurocomputing (2021)

    Google Scholar 

  9. Hajisalem, V., Babaie, S.: A hybrid intrusion detection system based on abc-afs algorithm for misuse and anomaly detection. Comput. Netw. (2018)

    Google Scholar 

  10. Hassan, M.M., Gumaei, A., Alsanad, A., Alrubaian, M., Fortino, G.: A hybrid deep learning model for efficient intrusion detection in big data environment. Inf. Sci. (2020)

    Google Scholar 

  11. Hevner, A., Chatterjee, S.: Design Research in Information Systems: Theory and Practice. Springer, US (2010)

    Book  Google Scholar 

  12. Ieracitano, C., Adeel, A., Morabito, F.C., Hussain, A.: A novel statistical analysis and autoencoder driven intelligent intrusion detection approach. Neurocomputing (2020)

    Google Scholar 

  13. Imrana, Y., Xiang, Y., Ali, L., Abdul-Rauf, Z.: A bidirectional lstm deep learning approach for intrusion detection. Expert Syst. Appl. (2021)

    Google Scholar 

  14. Kunang, Y.N., Nurmaini, S., Stiawan, D., Suprapto, B.Y.: Attack classification of an intrusion detection system using deep learning and hyperparameter optimization. J. Inf. Secur. Appl. (2021)

    Google Scholar 

  15. Lashkari, A.H., A.Kadir, A.F., Gonzalez, H., Mbah, K.F., A. Ghorbani, A.: Towards a network-based framework for android malware detection and characterization. In: 2017 15th Annual Conference on Privacy, Security and Trust (PST), pp. 233–23309 (2017). https://doi.org/10.1109/PST.2017.00035

  16. Li, Y., Xu, Y., Liu, Z., Hou, H., Zheng, Y., Xin, Y., Zhao, Y., Cui, L.: Robust detection for network intrusion of industrial iot based on multi-cnn fusion. Measurement (2020)

    Google Scholar 

  17. Moustafa, N., Slay, J.: Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS), pp. 1–6 (2015). https://doi.org/10.1109/MilCIS.2015.7348942

  18. Nguyen, M.T., Kim, K.: Genetic convolutional neural network for intrusion detection systems. Futur. Gener. Comput. Syst. (2020)

    Google Scholar 

  19. Nickerson, R.C., Varshney, U., Muntermann, J.: A method for taxonomy development and its application in information systems. Eur. J. Inf. Syst. (2013)

    Google Scholar 

  20. Pedrycz, W., Gomide, F.: Fuzzy Systems Engineering, Toward Human-Centric Computing. John Wiley & Sons Inc., Hoboken, New Jersey (2007)

    Book  Google Scholar 

  21. Perona Balda, I., Arbelaiz Gallego, O., Gurrutxaga Goikoetxea, I., Martín, J.I., Muguerza Rivero, J.F., Pérez de la Fuente, J.M.: Generation of the database gurekddcup (2017)

    Google Scholar 

  22. Rezvani, S., Wand, X., Pourpanah, F.: Intuitionistic fuzzy twin support vector machines. IEEE Trans. Fuzzy Syst. (2019)

    Google Scholar 

  23. Sazzadul Hoque, M., Mukit, M.A., Naser Bikas, M.A.: An implementation of intrusion detection system using genetic algorithms. Int. J. Netw. Secur. Appl. (IJNSA) (2012)

    Google Scholar 

  24. Scarfone, K., Mall, P.: Guide to intrusion detection and prevention systems (idps). Technical Report, National Institute of Standards and Technology (NIST) (2007)

    Google Scholar 

  25. Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: International Conference on Information Systems Security and Privacy (2018)

    Google Scholar 

  26. Song, J., Takakura, H., Okabe, Y., Eto, M., Inoue, D., Nakao, K.: Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for nids evaluation. In: Proceedings of the first workshop on building analysis datasets and gathering experience returns for security, pp. 29–36 (2011)

    Google Scholar 

  27. Tartakovsky, A.G., Rozovskii, B.L., Blazek, R.B., Kim, H.: A novel approach to detection of intrusions in computer networks via adaptive sequential and batch-sequential change-point detection methods. IEEE Trans. Signal Process. (2006)

    Google Scholar 

  28. Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the kdd cup 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1–6 (2009). https://doi.org/10.1109/CISDA.2009.5356528

  29. Wang, H., Gu, J., Wang, S.: An effective intrusion detection framework based on svm with feature augmentation. Knowl. Based Syst. (2017)

    Google Scholar 

  30. Wu, Z., Wand, J., Hu, L., Zhang, Z., Wu, H.: A network intrusion detection method based on semantic re-encoding and deep learning. J. Netw. Comput. Appl. (2020)

    Google Scholar 

  31. Wu, Z., Zhang, H., Wang, P., Sun, Z.: Rtids: A robust transformer-based approach for intrusion detection system. Digit. Object Identifier (2022)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rafael Burkhalter .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Burkhalter, R., Bischof, M., Portmann, E. (2024). Fuzzifying Intrusion Detection Systems with Modified Artificial Bee Colony and Support Vector Machine Algorithms. In: Castillo, O., Melin, P. (eds) New Horizons for Fuzzy Logic, Neural Networks and Metaheuristics. Studies in Computational Intelligence, vol 1149. Springer, Cham. https://doi.org/10.1007/978-3-031-55684-5_2

Download citation

Publish with us

Policies and ethics