Skip to main content

A Comparative Analysis of Different Soft Computing Techniques for Intrusion Detection System

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 969))

Abstract

In this internet era, the data are flooded with malicious activities. The role of soft computing techniques to classify highly vulnerable, complex and uncertain network data by devising an intrusion detection system is so significant. The proposed work emphasizes on the classification of normal and anomaly packets in the networks by carrying out the comparative performance evaluation of different soft computing tools including Genetic Programming (GP), Fuzzy logic, Artificial neural network (ANN) and Probabilistic model with Clustering methods using NSL-KDD dataset. Here, Fuzzy logic runs the first place in the performance metrics and the clustering algorithms and Genetic programming deliver the worst performances. Fuzzy Unordered Rule Induction Algorithm (FURIA) in Fuzzy logic gives a high detection rate of accuracy (99.69%) with the low rate of false alarms (0.31%). The computational time of FURIA (78.14 s) is not so expectant. So Fuzzy Rough Nearest Neighbor(FRNN) is recommended as an optimistic model with a sensible accuracy rate of 99.51% and tolerable false alarm rate of 0.49% along with a pretty good computational time of 0.33 s.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Sarkar, M.: Fuzzy-rough nearest neighbor algorithms in classification. Fuzzy Sets Syst. 158(19), 2134–2152 (2007)

    Article  MathSciNet  Google Scholar 

  2. The NSL KDD dataset (2016). http://nsl.cs.unb.ca/NSL-KDD/. Last Accessed 21 July 2017

  3. Weka- data mining machine learning software (2016). http://www.cs.waikato.ac.nz/ml/weka/. Last Accessed 24 Mar 2017

  4. Beqiri, E.: Neural networks for intrusion detection systems. In: Jahankhani, H., Hessami, A.G., Hsu, F. (eds.) ICGS3 2009. CCIS, vol. 45, pp. 156–165. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-04062-7_17

    Chapter  Google Scholar 

  5. Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: Network anomaly detection: methods, systems and tools. IEEE Commun. Surv. Tutor. 16, 303–336 (2014)

    Article  Google Scholar 

  6. Bonissone, P.P.: Soft computing: the convergence of emerging reasoning technologies. Soft Comput. 1(1), 6–18 (1997)

    Article  MathSciNet  Google Scholar 

  7. Cho, S.B.: Incorporating soft computing techniques into a probabilistic intrusion detection system. IEEE Trans. Syst. Man Cybern. Part C 32, 154–160 (2002)

    Article  Google Scholar 

  8. Conti, M., Dehghantanha, A., Franke, K., Watson, S.: Internet of things security and forensics: challenges and opportunities. Futur. Gener. Comput. Syst. 78, 544–546 (2018). https://doi.org/10.1016/j.future.2017.07.060. http://www.sciencedirect.com/science/article/pii/S0167739X17316667

    Article  Google Scholar 

  9. Dias, L.P., Cerqueira, J.J.F., Assis, K.D.R., Almeida, R.C.: Using artificial neural network in intrusion detection systems to computer networks. In: 2017 9th Computer Science and Electronic Engineering (CEEC), pp. 145–150 (2017)

    Google Scholar 

  10. Gasparovica-Asite, M., Aleksejeva, L.: Using fuzzy unordered rule induction algorithm for cancer data classification. In: Mendel 2011: 17th International Conference on Soft Computing: Evolutionary Computation, Genetic Programming, Fuzzy Logic, Rough Sets, Neural Networks, Fractals, Bayesian Methods, pp. 15–17, June 2011

    Google Scholar 

  11. Hodo, E., et al.: Threat analysis of IoT networks using artificial neural network intrusion detection system. In: 2016 International Symposium on Networks, Computers and Communications (ISNCC), pp. 1–6 (2016)

    Google Scholar 

  12. Hühn, J., Hüllermeier, E.: FURIA: an algorithm for unordered fuzzy rule induction. Data Min. Knowl. Discov. 19(3), 293–319 (2009)

    Article  MathSciNet  Google Scholar 

  13. Ibrahim, D.: An overview of soft computing. Procedia Comput. Sci. 102, 34–38 (2016)

    Article  Google Scholar 

  14. Ishitaki, T.: Application of neural networks for intrusion detection in Tor networks. In: 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops (WAINA). IEEE, Gwangju, South Korea (2015)

    Google Scholar 

  15. Mabu, S., Chen, C., Lu, N., Shimada, K., Hirasawa, K.: An intrusion-detection model based on fuzzy class-association-rule mining using genetic network programming. IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.) 41(1), 130–139 (2011)

    Article  Google Scholar 

  16. Mishra, N., Mishra, S.: Intrusion detection using IoT (2018)

    Google Scholar 

  17. Owais, S.S.J., Snásel, V., Krömer, P., Abraham, A.: Survey: using genetic algorithm approach in intrusion detection systems techniques. In: 2008 7th Computer Information Systems and Industrial Management Applications, pp. 300–307 (2008)

    Google Scholar 

  18. Panigrah, A., Patra, M.: Fuzzy rough classification models for network intrusion detection. Trans. Mach. Learn. Artif. Intell. 4(2), 7 (2016)

    Google Scholar 

  19. Rao, K.K., SVP Raju, G.: An overview on soft computing techniques. In: Mantri, A., Nandi, S., Kumar, G., Kumar, S. (eds.) HPAGC 2011. CCIS, vol. 169, pp. 9–23. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-22577-2_2

    Chapter  Google Scholar 

  20. Rao, M.V., Damodaram, A., Charyulu, N.C.B.: Algorithm for clustering with intrusion detection using modified and hashed k - means algorithms. In: Wyld, D.C., Zizka, J., Nagamalai, D. (eds.) Advances in Computer Science, Engineering & Applications, vol. 167, pp. 737–744. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-30111-7_70

    Chapter  Google Scholar 

  21. Subba, B., Biswas, S., Karmakar, S.: A neural network based system for intrusion detection and attack classification. In: 2016 Twenty Second National Conference on Communication (NCC), pp. 1–6 (2016)

    Google Scholar 

  22. Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1–6 (2009)

    Google Scholar 

  23. Varghese, J.E., Muniyal, B.: An investigation of classification algorithms for intrusion detection system - a quantitative approach. In: 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 2045–2051 (2017)

    Google Scholar 

  24. Weng, F., Jiang, Q., Shi, L., Wu, N.: An intrusion detection system based on the clustering ensemble. In: 2007 International Workshop on Anti-counterfeiting, Security and Identification (ASID), pp. 121–124 (2007)

    Google Scholar 

  25. Xiao, L., Wan, X., Lu, X., Zhang, Y., Wu, D.: IoT security techniques based on machine learning. CoRR abs/1801.06275 (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Josy Elsa Varghese or Balachandra Muniyal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Varghese, J.E., Muniyal, B. (2019). A Comparative Analysis of Different Soft Computing Techniques for Intrusion Detection System. In: Thampi, S., Madria, S., Wang, G., Rawat, D., Alcaraz Calero, J. (eds) Security in Computing and Communications. SSCC 2018. Communications in Computer and Information Science, vol 969. Springer, Singapore. https://doi.org/10.1007/978-981-13-5826-5_44

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-5826-5_44

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-5825-8

  • Online ISBN: 978-981-13-5826-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics