Abstract
The continuous development of computer networks has created serious worries about vulnerability and security. Network administrators have embraced Intrusion Detection Systems (IDS) to offer vital network security. Commercial IDS in the market are incapable of detecting fresh threats and instead produce false alarms for the typical user activity. Artificial Intelligence (AI) may be used to address these difficulties and enhance accuracy. ICA-based feature selection (FS) ranks features based on the attribute-class label correlation. The authors suggested an ICA-based feature selection algorithm combined with a support vector machine (SVM) classifier for detecting anomalies in network connections. The KDDCUP 99 datasets, which is a benchmark dataset for intrusion detection with current threats, were used in the experiments. In contrast to several state-of-the-art approaches, the suggested model outperforms them in terms of accuracy, sensitivity, detection rate (DR) false alarm, and specificity. IDS may be used to secure wireless payment systems. It is possible to establish secure integrated network management that is error-free, therefore boosting performance.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bouyeddou B, Harrou F, Kadri B, Sun Y (2021) Detecting network cyber-attacks using an integrated statistical approach. Clust Comput 24(2):1435–1453. https://doi.org/10.1007/s10586-020-03203-1
Azeez NA, Ayemobola TJ, Misra S, Maskeliūnas R, Damaševičius R (2019) Network intrusion detection with a hashing based Apriori algorithm using hadoop mapreduce. Computers 8(4):86
Ring M, Wunderlich S, Scheuring D, Landes D, Hotho A (2019) A survey of network-based intrusion detection data sets. Comput Secur 86:147–167. https://doi.org/10.1016/j.cose.2019.06.005
Shukla AK (2020) An efficient hybrid evolutionary approach for identification of zero-day attacks on wired/wireless network system. Wirel Pers Commun 1–29. https://doi.org/10.1007/s11277-020-07808-y
Zakeri A, Hokmabadi A (2019) Efficient feature selection method using real-valued grasshopper optimization algorithm. Expert Syst Appl 119:61–72
Jin D, Lu Y, Qin J, Cheng Z, Mao Z (2020) SwiftIDS: real-time intrusion detection system based on LightGBM and parallel intrusion detection mechanism. Comput Secur 97:101984
Dwivedi S, Vardhan M, Tripathi S (2020) Distributed denial-of-service prediction on IoT framework by learning techniques. Open Comput Sci 10(1):220–230
Mohammadi S, Mirvaziri H, Ghazizadeh-Ahsaee M, Karimipour H (2019) Cyber intrusion detection by combined feature selection algorithm. J Inf Secur Appl 44:80–88
Mafarja M, Aljarah I, Faris H, Hammouri AI, Ala’M AZ, Mirjalili S (2019) Binary grasshopper optimization algorithm approaches for feature selection problems. Expert Syst Appl 117:267–286
Shukla AK, Pippal SK, Chauhan SS (2019) An empirical evaluation of teaching-learning-based optimization, genetic algorithm and particle swarm optimization. Int J Comput Appl 1–15. https://doi.org/10.1080/1206212X.2019.1686562
Saremi S, Mirjalili S, Lewis A (2017) Grasshopper optimisation algorithm: theory and application. Adv Eng Softw 105:30–47
Ibrahim HT, Mazher WJ, Ucan ON, Bayat O (2019) A grasshopper optimizer approach for feature selection and optimizing SVM parameters utilizing real biomedical data sets. Neural Comput Appl 31(10):5965–5974
Mirjalili SZ, Mirjalili S, Saremi S, Faris H, Aljarah I (2018) Grasshopper optimization algorithm for multi-objective optimization problems. Appl Intell 48(4):805–820
Singh I, Kumar N, Srinivasa KG, Sharma T, Kumar V, Singhal S (2020) Database intrusion detection using role and user behavior-based risk assessment. J Inf Secur Appl 55:102654
Dwivedi S, Vardhan M, Tripathi S (2020) Incorporating evolutionary computation for securing wireless network against cyberthreats. J Supercomput 1–38
Tidjon LN, Frappier M, Mammar A (2019) Intrusion detection systems: a cross-domain overview. IEEE Commun Surv Tutor 21(4):3639–3681
Saharkhizan M, Azmoodeh A, Pajouh HH, Dehghantanha A, Parizi RM, Srivastava G (2020) A hybrid deep generative local metric learning method for intrusion detection. In: Handbook of big data privacy. Springer, Cham, Switzerland, pp 343–357
Alsaadi HI, Almuttairi RM, Bayat O, Ucani ON (2020) Computational intelligence algorithms to handle dimensionality reduction for enhancing intrusion detection system. J Inf Sci Eng 36(2):293–308
Shao XL, Liu YW, Geng MJ, Han JB (2014) The parallel implementation of mapreduce for the Bayesian algorithm to detect botnets. CAAI Trans Intell Syst 1:26–33
Wang S, Zou H, Sun Q, Yang F (2012) Bayesian approach with maximum entropy principle for trusted quality of web service metric in E-commerce applications. Secur Commun Netw 5(10):1112–1120
Amor NB, Benferhat S, Elouedi Z (2004) Naive Bayes versus decision trees in intrusion detection systems. In: Proceedings of the 2004 ACM symposium on applied computing, pp 420–424
Liu H, Hou X, Yang Z (2016) Design of intrusion detection system based on improved k-means algorithm. Comput Technol Dev 1:101–105
Al-Yaseen WL, Othman ZA, Nazri MZA (2017) Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system. Expert Syst Appl 67:296–303
Shams EA, Rizaner A (2018) A novel support vector machine-based intrusion detection system for mobile ad hoc networks. Wirel Netw 24(5):1821–1829
Zargar ST, Joshi J, Tipper D (2013) A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Commun Surv Tutor 15(4):2046–2069
Horng SJ, Su MY, Chen YH, Kao TW, Chen RJ, Lai JL, Perkasa CD (2011) A novel intrusion detection system based on hierarchical clustering and support vector machines. Expert Syst Appl 38(1):306–313
Pandeeswari N, Kumar G (2016) Anomaly detection system in cloud environment using fuzzy clustering-based ANN. Mob Netw Appl 21(3):494–505
Shah SAR, Issac B (2018) Performance comparison of intrusion detection systems and application of machine learning to Snort system. Futur Gener Comput Syst 80:157–170
Zhang B, Liu Z, Yanguo J, Ren J, Zhao X (2018) Network intrusion detection method based on PCA and Bayes algorithm. Secur Commun Netw 2018:1–11. https://doi.org/10.1155/2018/1914980
Peng K, Leung V, Zheng L, Wang S, Huang C, Lin T (2018) Intrusion detection systembased on decision tree over big data in fog environment. Wirel Commun Mob Comput 2018:1–10. https://doi.org/10.1155/2018/4680867
Aldhyani T, Joshi MR (2014) Analysis of dimensionality reduction in intrusion detection. Int J Comput Intell Informat 4(3):199–206
Kamarudin MH, Maple C, Watson T, Safa NS (2017) A new unified intrusion anomaly detection in identifying unseen web attacks. Networks 2017(2539034):1–18
Salunkhe UR, Mali SN (2017) Security enrichment in intrusion detection system using classifier ensemble. J Electr Comput Eng 201(10):1–6
Zhang HR, Han ZZ (2003) An improved sequential minimal optimization learning algorithm for regression support vector machine. J Softw 14(12):2006–2013
Zhang W, Fan J (2015) Cloud architecture intrusion detection system based on KKT condition and hyper-sphere incremental SVM algorithm. J Comput Appl 35(10):2886–2890
Ganapathy S, Kulothungan K, Muthurajkumar S, Vijayalakshmi M, Yogesh P, Kannan A (2013) Intelligent feature selection and classification techniques for intrusion detection in networks: a survey. EURASIP J Wirel Commun Netw 2013(1):1–16
Jaisankar N, Ganapathy S, Yogesh P, Kannan A, Anand K (2012) An intelligent agent-based intrusion detection system using fuzzy rough set-based outlier detection. In: Soft computing techniques in vision science. Springer, Berlin, Heidelberg, pp 147–153
Jaisankar N, Ganapathy S, Kannan A (2012) Intelligent intrusion detection system using fuzzy rough set based C4. 5 algorithms. In: Proceedings of the international conference on advances in computing, communications and informatics, pp 596–601
Ganapathy S, Kulothungan K, Yogesh P, Kannan A (2012) A novel weighted fuzzy C-means clustering based on immune genetic algorithm for intrusion detection. Procedia Eng 38:1750–1757
Nancy P, Muthurajkumar S, Ganapathy S, Kumar SS, Selvi M, Arputharaj K (2020) Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks. IET Commun 14(5):888–895. https://doi.org/10.1049/iet-com.2019.0172
Yin C, Zhu Y, Fei J, He X (2017) A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5:21954–21961
Shen Y, Zheng K, Wu C, Zhang M, Niu X, Yang Y (2018) An ensemble method based on selection using bat algorithm for intrusion detection. Comput J 61(4):526–538
Shone N, Ngoc TN, Phai VD, Shi Q (2018) A deep learning approach to network intrusion detection. IEEE Trans Emerg Top Comput Intell 2(1):41–50
Ali MH, Al Mohammed BAD, Ismail A, Zolkipli MF (2018) A new intrusion detection system based on fast learning network and particle swarm optimization. IEEE Access 6:20255–20261
Jia Y, Wang M, Wang Y (2019) Network intrusion detection algorithm based on deep neural network. IET Inf Secur 13(1):48–53
Wu X, Jiang G, Wang X, Xie P, Li X (2019) A multi-level-denoising autoencoder approach for wind turbine fault detection. IEEE Access 7:59376–59387
Yan B, Han G (2018) Effective feature extraction via stacked sparse autoencoder to improve intrusion detection system. IEEE Access 6:41238–41248
Xu C, Shen J, Du X, Zhang F (2018) An intrusion detection system using a deep neural network with gated recurrent units. IEEE Access 6:48697–48707
Al-Qatf M, Lasheng Y, Al-Habib M, Al-Sabahi K (2018) Deep learning approach combining sparse autoencoder with SVM for network intrusion detection. IEEE Access 6:52843–52856
Papamartzivanos D, Mármol FG, Kambourakis G (2019) Introducing deep learning self-adaptive misuse network intrusion detection systems. IEEE Access 7:13546–13560
Khan FA, Gumaei A, Derhab A, Hussain A (2019) A novel two-stage deep learning model for efficient network intrusion detection. IEEE Access 7:30373–30385
Xiao Y, Xing C, Zhang T, Zhao Z (2019) An intrusion detection model based on feature reduction and convolutional neural networks. IEEE Access 7:42210–42219
Yao H, Fu D, Zhang P, Li M, Liu Y (2018) MSML: a novel multilevel semi-supervised machine learning framework for intrusion detection system. IEEE Internet Things J 6(2):1949–1959
Gao X, Shan C, Hu C, Niu Z, Liu Z (2019) An adaptive ensemble machine learning model for intrusion detection. IEEE Access 7:82512–82521
Wei P, Li Y, Zhang Z, Hu T, Li Z, Liu D (2019) An optimization method for intrusion detection classification model based on deep belief network. IEEE Access 7:87593–87605
Zhang X, Chen J, Zhou Y, Han L, Lin J (2019) A multiple-layer representation learning model for network-based attack detection. IEEE Access 7:91992–92008
Malaiya RK, Kwon D, Kim J, Suh SC, Kim H, Kim I (2018) An empirical evaluation of deep learning for network anomaly detection. In: 2018 international conference on computing, networking and communications (ICNC). IEEE, pp 893–898
Karatas G, Demir O, Sahingoz OK (2020) Increasing the performance of machine learning-based IDSs on an imbalanced and up-to-date dataset. IEEE Access 8:32150–32162
Jiang K, Wang W, Wang A, Wu H (2020) Network intrusion detection combined hybrid sampling with deep hierarchical network. IEEE Access 8:32464–32476
Yang Y, Zheng K, Wu B, Yang Y, Wang X (2020) Network intrusion detection based on supervised adversarial variational auto-encoder with regularization. IEEE Access 8:42169–42184
Andresini G, Appice A, Di Mauro N, Loglisci C, Malerba D (2020) Multi-channel deep feature learning for intrusion detection. IEEE Access 8:53346–53359
Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE symposium on computational intelligence for security and defense applications. IEEE, pp 1–6
Chen WH, Hsu SH, Shen HP (2005) Application of SVM and ANN for intrusion detection. Comput Oper Res 32(10):2617–2634. https://doi.org/10.1016/j.cor.2004.03.019
Roopa Devi EM, Suganthe RC (2020) Enhanced transudative support vector machine classification with grey wolf optimizer cuckoo search optimization for intrusion detection system. Concurr Comput: Pract Exp 32(4):e4999. https://doi.org/10.1002/cpe.4999
Abdulsalam SO, Mohammed AA, Ajao JF, Babatunde RS, Ogundokun RO, Nnodim CT, Arowolo MO (2020) Performance evaluation of ANOVA and RFE algorithms for classifying microarray dataset using SVM. Lect Notes Bus Inf Process 402:480–492
Ghanem K, Aparicio-Navarro FJ, Kyriakopoulos KG, Lambotharan S, Chambers JA (2017) Support vector machine for network intrusion and cyber-attack detection. In: 2017 sensor signal processing for defense conference (SSPD). IEEE pp 1–5. https://doi.org/10.1109/SSPD.2017.8233268
Alsaadi HIH, ALmuttari RM, Ucan ON, Bayat O (2021) An adapting soft computing model for the intrusion detection system. Comput Intell
Awotunde JB, Ogundokun RO, Jimoh RG, Misra S, Aro TO (2021) Machine learning algorithm for cryptocurrencies price prediction. Stud Comput Intell 972:421–447
Deng X, Liu Q, Deng Y, Mahadevan S (2016) An improved method to construct basic probability assignment based on the confusion matrix for classification problem. Inf Sci 340:250–261
Ogundokun RO, Awotunde JB, Sadiku P, Adeniyi EA, Abiodun M, Dauda OI (2021) An enhanced intrusion detection system using particle swarm optimization feature extraction technique. Procedia Comput Sci 193:504–512
Zhang G, Wang X, Li R, Song Y, He J, Lai J (2020) Network intrusion detection based on conditional Wasserstein generative adversarial network and cost-sensitive stacked autoencoder. IEEE Access 8:190431–190447
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Ogundokun, R.O., Misra, S., Bajeh, A.O., Okoro, U.O., Ahuja, R. (2022). An Integrated IDS Using ICA-Based Feature Selection and SVM Classification Method. In: Misra, S., Arumugam, C. (eds) Illumination of Artificial Intelligence in Cybersecurity and Forensics. Lecture Notes on Data Engineering and Communications Technologies, vol 109. Springer, Cham. https://doi.org/10.1007/978-3-030-93453-8_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-93453-8_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-93452-1
Online ISBN: 978-3-030-93453-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)