Skip to main content

An Integrated IDS Using ICA-Based Feature Selection and SVM Classification Method

  • Chapter
  • First Online:
Illumination of Artificial Intelligence in Cybersecurity and Forensics

Abstract

The continuous development of computer networks has created serious worries about vulnerability and security. Network administrators have embraced Intrusion Detection Systems (IDS) to offer vital network security. Commercial IDS in the market are incapable of detecting fresh threats and instead produce false alarms for the typical user activity. Artificial Intelligence (AI) may be used to address these difficulties and enhance accuracy. ICA-based feature selection (FS) ranks features based on the attribute-class label correlation. The authors suggested an ICA-based feature selection algorithm combined with a support vector machine (SVM) classifier for detecting anomalies in network connections. The KDDCUP 99 datasets, which is a benchmark dataset for intrusion detection with current threats, were used in the experiments. In contrast to several state-of-the-art approaches, the suggested model outperforms them in terms of accuracy, sensitivity, detection rate (DR) false alarm, and specificity. IDS may be used to secure wireless payment systems. It is possible to establish secure integrated network management that is error-free, therefore boosting performance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bouyeddou B, Harrou F, Kadri B, Sun Y (2021) Detecting network cyber-attacks using an integrated statistical approach. Clust Comput 24(2):1435–1453. https://doi.org/10.1007/s10586-020-03203-1

    Article  Google Scholar 

  2. Azeez NA, Ayemobola TJ, Misra S, Maskeliūnas R, Damaševičius R (2019) Network intrusion detection with a hashing based Apriori algorithm using hadoop mapreduce. Computers 8(4):86

    Article  Google Scholar 

  3. Ring M, Wunderlich S, Scheuring D, Landes D, Hotho A (2019) A survey of network-based intrusion detection data sets. Comput Secur 86:147–167. https://doi.org/10.1016/j.cose.2019.06.005

    Article  Google Scholar 

  4. Shukla AK (2020) An efficient hybrid evolutionary approach for identification of zero-day attacks on wired/wireless network system. Wirel Pers Commun 1–29. https://doi.org/10.1007/s11277-020-07808-y

  5. Zakeri A, Hokmabadi A (2019) Efficient feature selection method using real-valued grasshopper optimization algorithm. Expert Syst Appl 119:61–72

    Article  Google Scholar 

  6. Jin D, Lu Y, Qin J, Cheng Z, Mao Z (2020) SwiftIDS: real-time intrusion detection system based on LightGBM and parallel intrusion detection mechanism. Comput Secur 97:101984

    Google Scholar 

  7. Dwivedi S, Vardhan M, Tripathi S (2020) Distributed denial-of-service prediction on IoT framework by learning techniques. Open Comput Sci 10(1):220–230

    Article  Google Scholar 

  8. Mohammadi S, Mirvaziri H, Ghazizadeh-Ahsaee M, Karimipour H (2019) Cyber intrusion detection by combined feature selection algorithm. J Inf Secur Appl 44:80–88

    Google Scholar 

  9. Mafarja M, Aljarah I, Faris H, Hammouri AI, Ala’M AZ, Mirjalili S (2019) Binary grasshopper optimization algorithm approaches for feature selection problems. Expert Syst Appl 117:267–286

    Google Scholar 

  10. Shukla AK, Pippal SK, Chauhan SS (2019) An empirical evaluation of teaching-learning-based optimization, genetic algorithm and particle swarm optimization. Int J Comput Appl 1–15. https://doi.org/10.1080/1206212X.2019.1686562

  11. Saremi S, Mirjalili S, Lewis A (2017) Grasshopper optimisation algorithm: theory and application. Adv Eng Softw 105:30–47

    Article  Google Scholar 

  12. Ibrahim HT, Mazher WJ, Ucan ON, Bayat O (2019) A grasshopper optimizer approach for feature selection and optimizing SVM parameters utilizing real biomedical data sets. Neural Comput Appl 31(10):5965–5974

    Article  Google Scholar 

  13. Mirjalili SZ, Mirjalili S, Saremi S, Faris H, Aljarah I (2018) Grasshopper optimization algorithm for multi-objective optimization problems. Appl Intell 48(4):805–820

    Article  Google Scholar 

  14. Singh I, Kumar N, Srinivasa KG, Sharma T, Kumar V, Singhal S (2020) Database intrusion detection using role and user behavior-based risk assessment. J Inf Secur Appl 55:102654

    Google Scholar 

  15. Dwivedi S, Vardhan M, Tripathi S (2020) Incorporating evolutionary computation for securing wireless network against cyberthreats. J Supercomput 1–38

    Google Scholar 

  16. Tidjon LN, Frappier M, Mammar A (2019) Intrusion detection systems: a cross-domain overview. IEEE Commun Surv Tutor 21(4):3639–3681

    Article  Google Scholar 

  17. Saharkhizan M, Azmoodeh A, Pajouh HH, Dehghantanha A, Parizi RM, Srivastava G (2020) A hybrid deep generative local metric learning method for intrusion detection. In: Handbook of big data privacy. Springer, Cham, Switzerland, pp 343–357

    Google Scholar 

  18. Alsaadi HI, Almuttairi RM, Bayat O, Ucani ON (2020) Computational intelligence algorithms to handle dimensionality reduction for enhancing intrusion detection system. J Inf Sci Eng 36(2):293–308

    Google Scholar 

  19. Shao XL, Liu YW, Geng MJ, Han JB (2014) The parallel implementation of mapreduce for the Bayesian algorithm to detect botnets. CAAI Trans Intell Syst 1:26–33

    Google Scholar 

  20. Wang S, Zou H, Sun Q, Yang F (2012) Bayesian approach with maximum entropy principle for trusted quality of web service metric in E-commerce applications. Secur Commun Netw 5(10):1112–1120

    Article  Google Scholar 

  21. Amor NB, Benferhat S, Elouedi Z (2004) Naive Bayes versus decision trees in intrusion detection systems. In: Proceedings of the 2004 ACM symposium on applied computing, pp 420–424

    Google Scholar 

  22. Liu H, Hou X, Yang Z (2016) Design of intrusion detection system based on improved k-means algorithm. Comput Technol Dev 1:101–105

    Google Scholar 

  23. Al-Yaseen WL, Othman ZA, Nazri MZA (2017) Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system. Expert Syst Appl 67:296–303

    Google Scholar 

  24. Shams EA, Rizaner A (2018) A novel support vector machine-based intrusion detection system for mobile ad hoc networks. Wirel Netw 24(5):1821–1829

    Article  Google Scholar 

  25. Zargar ST, Joshi J, Tipper D (2013) A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Commun Surv Tutor 15(4):2046–2069

    Article  Google Scholar 

  26. Horng SJ, Su MY, Chen YH, Kao TW, Chen RJ, Lai JL, Perkasa CD (2011) A novel intrusion detection system based on hierarchical clustering and support vector machines. Expert Syst Appl 38(1):306–313

    Article  Google Scholar 

  27. Pandeeswari N, Kumar G (2016) Anomaly detection system in cloud environment using fuzzy clustering-based ANN. Mob Netw Appl 21(3):494–505

    Article  Google Scholar 

  28. Shah SAR, Issac B (2018) Performance comparison of intrusion detection systems and application of machine learning to Snort system. Futur Gener Comput Syst 80:157–170

    Article  Google Scholar 

  29. Zhang B, Liu Z, Yanguo J, Ren J, Zhao X (2018) Network intrusion detection method based on PCA and Bayes algorithm. Secur Commun Netw 2018:1–11. https://doi.org/10.1155/2018/1914980

    Article  Google Scholar 

  30. Peng K, Leung V, Zheng L, Wang S, Huang C, Lin T (2018) Intrusion detection systembased on decision tree over big data in fog environment. Wirel Commun Mob Comput 2018:1–10. https://doi.org/10.1155/2018/4680867

    Article  Google Scholar 

  31. Aldhyani T, Joshi MR (2014) Analysis of dimensionality reduction in intrusion detection. Int J Comput Intell Informat 4(3):199–206

    Google Scholar 

  32. Kamarudin MH, Maple C, Watson T, Safa NS (2017) A new unified intrusion anomaly detection in identifying unseen web attacks. Networks 2017(2539034):1–18

    Google Scholar 

  33. Salunkhe UR, Mali SN (2017) Security enrichment in intrusion detection system using classifier ensemble. J Electr Comput Eng 201(10):1–6

    Google Scholar 

  34. Zhang HR, Han ZZ (2003) An improved sequential minimal optimization learning algorithm for regression support vector machine. J Softw 14(12):2006–2013

    MathSciNet  MATH  Google Scholar 

  35. Zhang W, Fan J (2015) Cloud architecture intrusion detection system based on KKT condition and hyper-sphere incremental SVM algorithm. J Comput Appl 35(10):2886–2890

    Google Scholar 

  36. Ganapathy S, Kulothungan K, Muthurajkumar S, Vijayalakshmi M, Yogesh P, Kannan A (2013) Intelligent feature selection and classification techniques for intrusion detection in networks: a survey. EURASIP J Wirel Commun Netw 2013(1):1–16

    Article  Google Scholar 

  37. Jaisankar N, Ganapathy S, Yogesh P, Kannan A, Anand K (2012) An intelligent agent-based intrusion detection system using fuzzy rough set-based outlier detection. In: Soft computing techniques in vision science. Springer, Berlin, Heidelberg, pp 147–153

    Google Scholar 

  38. Jaisankar N, Ganapathy S, Kannan A (2012) Intelligent intrusion detection system using fuzzy rough set based C4. 5 algorithms. In: Proceedings of the international conference on advances in computing, communications and informatics, pp 596–601

    Google Scholar 

  39. Ganapathy S, Kulothungan K, Yogesh P, Kannan A (2012) A novel weighted fuzzy C-means clustering based on immune genetic algorithm for intrusion detection. Procedia Eng 38:1750–1757

    Article  Google Scholar 

  40. Nancy P, Muthurajkumar S, Ganapathy S, Kumar SS, Selvi M, Arputharaj K (2020) Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks. IET Commun 14(5):888–895. https://doi.org/10.1049/iet-com.2019.0172

    Article  Google Scholar 

  41. Yin C, Zhu Y, Fei J, He X (2017) A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5:21954–21961

    Article  Google Scholar 

  42. Shen Y, Zheng K, Wu C, Zhang M, Niu X, Yang Y (2018) An ensemble method based on selection using bat algorithm for intrusion detection. Comput J 61(4):526–538

    Article  Google Scholar 

  43. Shone N, Ngoc TN, Phai VD, Shi Q (2018) A deep learning approach to network intrusion detection. IEEE Trans Emerg Top Comput Intell 2(1):41–50

    Article  Google Scholar 

  44. Ali MH, Al Mohammed BAD, Ismail A, Zolkipli MF (2018) A new intrusion detection system based on fast learning network and particle swarm optimization. IEEE Access 6:20255–20261

    Article  Google Scholar 

  45. Jia Y, Wang M, Wang Y (2019) Network intrusion detection algorithm based on deep neural network. IET Inf Secur 13(1):48–53

    Article  Google Scholar 

  46. Wu X, Jiang G, Wang X, Xie P, Li X (2019) A multi-level-denoising autoencoder approach for wind turbine fault detection. IEEE Access 7:59376–59387

    Article  Google Scholar 

  47. Yan B, Han G (2018) Effective feature extraction via stacked sparse autoencoder to improve intrusion detection system. IEEE Access 6:41238–41248

    Article  Google Scholar 

  48. Xu C, Shen J, Du X, Zhang F (2018) An intrusion detection system using a deep neural network with gated recurrent units. IEEE Access 6:48697–48707

    Article  Google Scholar 

  49. Al-Qatf M, Lasheng Y, Al-Habib M, Al-Sabahi K (2018) Deep learning approach combining sparse autoencoder with SVM for network intrusion detection. IEEE Access 6:52843–52856

    Google Scholar 

  50. Papamartzivanos D, Mármol FG, Kambourakis G (2019) Introducing deep learning self-adaptive misuse network intrusion detection systems. IEEE Access 7:13546–13560

    Article  Google Scholar 

  51. Khan FA, Gumaei A, Derhab A, Hussain A (2019) A novel two-stage deep learning model for efficient network intrusion detection. IEEE Access 7:30373–30385

    Article  Google Scholar 

  52. Xiao Y, Xing C, Zhang T, Zhao Z (2019) An intrusion detection model based on feature reduction and convolutional neural networks. IEEE Access 7:42210–42219

    Article  Google Scholar 

  53. Yao H, Fu D, Zhang P, Li M, Liu Y (2018) MSML: a novel multilevel semi-supervised machine learning framework for intrusion detection system. IEEE Internet Things J 6(2):1949–1959

    Article  Google Scholar 

  54. Gao X, Shan C, Hu C, Niu Z, Liu Z (2019) An adaptive ensemble machine learning model for intrusion detection. IEEE Access 7:82512–82521

    Article  Google Scholar 

  55. Wei P, Li Y, Zhang Z, Hu T, Li Z, Liu D (2019) An optimization method for intrusion detection classification model based on deep belief network. IEEE Access 7:87593–87605

    Article  Google Scholar 

  56. Zhang X, Chen J, Zhou Y, Han L, Lin J (2019) A multiple-layer representation learning model for network-based attack detection. IEEE Access 7:91992–92008

    Article  Google Scholar 

  57. Malaiya RK, Kwon D, Kim J, Suh SC, Kim H, Kim I (2018) An empirical evaluation of deep learning for network anomaly detection. In: 2018 international conference on computing, networking and communications (ICNC). IEEE, pp 893–898

    Google Scholar 

  58. Karatas G, Demir O, Sahingoz OK (2020) Increasing the performance of machine learning-based IDSs on an imbalanced and up-to-date dataset. IEEE Access 8:32150–32162

    Article  Google Scholar 

  59. Jiang K, Wang W, Wang A, Wu H (2020) Network intrusion detection combined hybrid sampling with deep hierarchical network. IEEE Access 8:32464–32476

    Article  Google Scholar 

  60. Yang Y, Zheng K, Wu B, Yang Y, Wang X (2020) Network intrusion detection based on supervised adversarial variational auto-encoder with regularization. IEEE Access 8:42169–42184

    Article  Google Scholar 

  61. Andresini G, Appice A, Di Mauro N, Loglisci C, Malerba D (2020) Multi-channel deep feature learning for intrusion detection. IEEE Access 8:53346–53359

    Article  Google Scholar 

  62. Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE symposium on computational intelligence for security and defense applications. IEEE, pp 1–6

    Google Scholar 

  63. Chen WH, Hsu SH, Shen HP (2005) Application of SVM and ANN for intrusion detection. Comput Oper Res 32(10):2617–2634. https://doi.org/10.1016/j.cor.2004.03.019

    Article  MATH  Google Scholar 

  64. Roopa Devi EM, Suganthe RC (2020) Enhanced transudative support vector machine classification with grey wolf optimizer cuckoo search optimization for intrusion detection system. Concurr Comput: Pract Exp 32(4):e4999. https://doi.org/10.1002/cpe.4999

  65. Abdulsalam SO, Mohammed AA, Ajao JF, Babatunde RS, Ogundokun RO, Nnodim CT, Arowolo MO (2020) Performance evaluation of ANOVA and RFE algorithms for classifying microarray dataset using SVM. Lect Notes Bus Inf Process 402:480–492

    Google Scholar 

  66. Ghanem K, Aparicio-Navarro FJ, Kyriakopoulos KG, Lambotharan S, Chambers JA (2017) Support vector machine for network intrusion and cyber-attack detection. In: 2017 sensor signal processing for defense conference (SSPD). IEEE pp 1–5. https://doi.org/10.1109/SSPD.2017.8233268

  67. Alsaadi HIH, ALmuttari RM, Ucan ON, Bayat O (2021) An adapting soft computing model for the intrusion detection system. Comput Intell

    Google Scholar 

  68. Awotunde JB, Ogundokun RO, Jimoh RG, Misra S, Aro TO (2021) Machine learning algorithm for cryptocurrencies price prediction. Stud Comput Intell 972:421–447

    Article  Google Scholar 

  69. Deng X, Liu Q, Deng Y, Mahadevan S (2016) An improved method to construct basic probability assignment based on the confusion matrix for classification problem. Inf Sci 340:250–261

    Article  Google Scholar 

  70. Ogundokun RO, Awotunde JB, Sadiku P, Adeniyi EA, Abiodun M, Dauda OI (2021) An enhanced intrusion detection system using particle swarm optimization feature extraction technique. Procedia Comput Sci 193:504–512

    Article  Google Scholar 

  71. Zhang G, Wang X, Li R, Song Y, He J, Lai J (2020) Network intrusion detection based on conditional Wasserstein generative adversarial network and cost-sensitive stacked autoencoder. IEEE Access 8:190431–190447

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Roseline Oluwaseun Ogundokun .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Ogundokun, R.O., Misra, S., Bajeh, A.O., Okoro, U.O., Ahuja, R. (2022). An Integrated IDS Using ICA-Based Feature Selection and SVM Classification Method. In: Misra, S., Arumugam, C. (eds) Illumination of Artificial Intelligence in Cybersecurity and Forensics. Lecture Notes on Data Engineering and Communications Technologies, vol 109. Springer, Cham. https://doi.org/10.1007/978-3-030-93453-8_11

Download citation

Publish with us

Policies and ethics