Abstract
Corporate networks are popular targets for hackers, either to be spied on, steal trade secrets or to extort money by encrypting data. Possible safeguards are intrusion detection systems (IDS) which try to detect attacks by analyzing network traffic. This traffic is inherently vague and usually can not be classified unambiguously into attacks or normal data flow. A fuzzy classification system creates a more accurate representation by using membership degrees for the sets of attack data and normal data. However, research combining IDS and fuzzy architecture has been minimal. This paper explores a fuzzy approach to IDS. We give a comprehensive overview of recent studies, analyze how those solutions were built and compare them using the metrics accuracy, detection rate and false alarm rate. We further propose two new IDS models: One using a fuzzy Artificial Bee Colony and the other the Intuitionistic Fuzzy Twin Support Vector Machine algorithm. The two models and their combination are benchmarked by classifying the test data sets KDD99, NSL-KDD, UNSW-NB15 and CSE-CIC-IDS2018 and then compared to the studies from our literature review. Our results show that they can produce comparable results and more transparency when detecting attack patterns in network traffic. This suggests that fuzzy engineering could contribute to creating more resilient IDS.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
The projects source code is available at https://github.com/rafibu/intrusion_detection_system.
References
The rbf kernel in svm: A complete guide. https://www.pycodemates.com/2022/10/the-rbf-kernel-in-svm-complete-guide.html. Accessed 29 May 2023
Al-Nashif, Y., Kumar, A., Hairi, S.: Multi-level intrusion detection system (ml-ids). In: International Conference on Automonic Computing
Alazzam, H., Sharieh, A., Sabri, K.E.: A feature selection algorithm for intrusion detection system based on pigeon inspired optimizer. Expert Syst. Appl. (2020)
Aljawarneh, S., Aldwairi, M., Yassein, M.B.: Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. J. Comput. Sci. (2018)
Altwaijry, H., Algarny, S.: Multi-layer Bayesian based intrusion detection system. J. King Saud Univ. Comput. Inf. Sci. (2011)
Andresini, G., Appica, A., Malerba, D.: Autoencoder-based deep metric learning for network intrusion detection. Inf. Sci. (2021)
Andresini, G., Appice, A., Malerba, D.: Nearest cluster-based intrusion detection through convolutional neural networks. Knowl. Based Syst. (2021)
Choras, M., Pawlicki, M.: Intrusion detection approach based on optimised artificial neural network. Neurocomputing (2021)
Hajisalem, V., Babaie, S.: A hybrid intrusion detection system based on abc-afs algorithm for misuse and anomaly detection. Comput. Netw. (2018)
Hassan, M.M., Gumaei, A., Alsanad, A., Alrubaian, M., Fortino, G.: A hybrid deep learning model for efficient intrusion detection in big data environment. Inf. Sci. (2020)
Hevner, A., Chatterjee, S.: Design Research in Information Systems: Theory and Practice. Springer, US (2010)
Ieracitano, C., Adeel, A., Morabito, F.C., Hussain, A.: A novel statistical analysis and autoencoder driven intelligent intrusion detection approach. Neurocomputing (2020)
Imrana, Y., Xiang, Y., Ali, L., Abdul-Rauf, Z.: A bidirectional lstm deep learning approach for intrusion detection. Expert Syst. Appl. (2021)
Kunang, Y.N., Nurmaini, S., Stiawan, D., Suprapto, B.Y.: Attack classification of an intrusion detection system using deep learning and hyperparameter optimization. J. Inf. Secur. Appl. (2021)
Lashkari, A.H., A.Kadir, A.F., Gonzalez, H., Mbah, K.F., A. Ghorbani, A.: Towards a network-based framework for android malware detection and characterization. In: 2017 15th Annual Conference on Privacy, Security and Trust (PST), pp. 233–23309 (2017). https://doi.org/10.1109/PST.2017.00035
Li, Y., Xu, Y., Liu, Z., Hou, H., Zheng, Y., Xin, Y., Zhao, Y., Cui, L.: Robust detection for network intrusion of industrial iot based on multi-cnn fusion. Measurement (2020)
Moustafa, N., Slay, J.: Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS), pp. 1–6 (2015). https://doi.org/10.1109/MilCIS.2015.7348942
Nguyen, M.T., Kim, K.: Genetic convolutional neural network for intrusion detection systems. Futur. Gener. Comput. Syst. (2020)
Nickerson, R.C., Varshney, U., Muntermann, J.: A method for taxonomy development and its application in information systems. Eur. J. Inf. Syst. (2013)
Pedrycz, W., Gomide, F.: Fuzzy Systems Engineering, Toward Human-Centric Computing. John Wiley & Sons Inc., Hoboken, New Jersey (2007)
Perona Balda, I., Arbelaiz Gallego, O., Gurrutxaga Goikoetxea, I., Martín, J.I., Muguerza Rivero, J.F., Pérez de la Fuente, J.M.: Generation of the database gurekddcup (2017)
Rezvani, S., Wand, X., Pourpanah, F.: Intuitionistic fuzzy twin support vector machines. IEEE Trans. Fuzzy Syst. (2019)
Sazzadul Hoque, M., Mukit, M.A., Naser Bikas, M.A.: An implementation of intrusion detection system using genetic algorithms. Int. J. Netw. Secur. Appl. (IJNSA) (2012)
Scarfone, K., Mall, P.: Guide to intrusion detection and prevention systems (idps). Technical Report, National Institute of Standards and Technology (NIST) (2007)
Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: International Conference on Information Systems Security and Privacy (2018)
Song, J., Takakura, H., Okabe, Y., Eto, M., Inoue, D., Nakao, K.: Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for nids evaluation. In: Proceedings of the first workshop on building analysis datasets and gathering experience returns for security, pp. 29–36 (2011)
Tartakovsky, A.G., Rozovskii, B.L., Blazek, R.B., Kim, H.: A novel approach to detection of intrusions in computer networks via adaptive sequential and batch-sequential change-point detection methods. IEEE Trans. Signal Process. (2006)
Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the kdd cup 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1–6 (2009). https://doi.org/10.1109/CISDA.2009.5356528
Wang, H., Gu, J., Wang, S.: An effective intrusion detection framework based on svm with feature augmentation. Knowl. Based Syst. (2017)
Wu, Z., Wand, J., Hu, L., Zhang, Z., Wu, H.: A network intrusion detection method based on semantic re-encoding and deep learning. J. Netw. Comput. Appl. (2020)
Wu, Z., Zhang, H., Wang, P., Sun, Z.: Rtids: A robust transformer-based approach for intrusion detection system. Digit. Object Identifier (2022)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Burkhalter, R., Bischof, M., Portmann, E. (2024). Fuzzifying Intrusion Detection Systems with Modified Artificial Bee Colony and Support Vector Machine Algorithms. In: Castillo, O., Melin, P. (eds) New Horizons for Fuzzy Logic, Neural Networks and Metaheuristics. Studies in Computational Intelligence, vol 1149. Springer, Cham. https://doi.org/10.1007/978-3-031-55684-5_2
Download citation
DOI: https://doi.org/10.1007/978-3-031-55684-5_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-55683-8
Online ISBN: 978-3-031-55684-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)