Abstract
In this internet era, the data are flooded with malicious activities. The role of soft computing techniques to classify highly vulnerable, complex and uncertain network data by devising an intrusion detection system is so significant. The proposed work emphasizes on the classification of normal and anomaly packets in the networks by carrying out the comparative performance evaluation of different soft computing tools including Genetic Programming (GP), Fuzzy logic, Artificial neural network (ANN) and Probabilistic model with Clustering methods using NSL-KDD dataset. Here, Fuzzy logic runs the first place in the performance metrics and the clustering algorithms and Genetic programming deliver the worst performances. Fuzzy Unordered Rule Induction Algorithm (FURIA) in Fuzzy logic gives a high detection rate of accuracy (99.69%) with the low rate of false alarms (0.31%). The computational time of FURIA (78.14 s) is not so expectant. So Fuzzy Rough Nearest Neighbor(FRNN) is recommended as an optimistic model with a sensible accuracy rate of 99.51% and tolerable false alarm rate of 0.49% along with a pretty good computational time of 0.33 s.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Sarkar, M.: Fuzzy-rough nearest neighbor algorithms in classification. Fuzzy Sets Syst. 158(19), 2134–2152 (2007)
The NSL KDD dataset (2016). http://nsl.cs.unb.ca/NSL-KDD/. Last Accessed 21 July 2017
Weka- data mining machine learning software (2016). http://www.cs.waikato.ac.nz/ml/weka/. Last Accessed 24 Mar 2017
Beqiri, E.: Neural networks for intrusion detection systems. In: Jahankhani, H., Hessami, A.G., Hsu, F. (eds.) ICGS3 2009. CCIS, vol. 45, pp. 156–165. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-04062-7_17
Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: Network anomaly detection: methods, systems and tools. IEEE Commun. Surv. Tutor. 16, 303–336 (2014)
Bonissone, P.P.: Soft computing: the convergence of emerging reasoning technologies. Soft Comput. 1(1), 6–18 (1997)
Cho, S.B.: Incorporating soft computing techniques into a probabilistic intrusion detection system. IEEE Trans. Syst. Man Cybern. Part C 32, 154–160 (2002)
Conti, M., Dehghantanha, A., Franke, K., Watson, S.: Internet of things security and forensics: challenges and opportunities. Futur. Gener. Comput. Syst. 78, 544–546 (2018). https://doi.org/10.1016/j.future.2017.07.060. http://www.sciencedirect.com/science/article/pii/S0167739X17316667
Dias, L.P., Cerqueira, J.J.F., Assis, K.D.R., Almeida, R.C.: Using artificial neural network in intrusion detection systems to computer networks. In: 2017 9th Computer Science and Electronic Engineering (CEEC), pp. 145–150 (2017)
Gasparovica-Asite, M., Aleksejeva, L.: Using fuzzy unordered rule induction algorithm for cancer data classification. In: Mendel 2011: 17th International Conference on Soft Computing: Evolutionary Computation, Genetic Programming, Fuzzy Logic, Rough Sets, Neural Networks, Fractals, Bayesian Methods, pp. 15–17, June 2011
Hodo, E., et al.: Threat analysis of IoT networks using artificial neural network intrusion detection system. In: 2016 International Symposium on Networks, Computers and Communications (ISNCC), pp. 1–6 (2016)
Hühn, J., Hüllermeier, E.: FURIA: an algorithm for unordered fuzzy rule induction. Data Min. Knowl. Discov. 19(3), 293–319 (2009)
Ibrahim, D.: An overview of soft computing. Procedia Comput. Sci. 102, 34–38 (2016)
Ishitaki, T.: Application of neural networks for intrusion detection in Tor networks. In: 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops (WAINA). IEEE, Gwangju, South Korea (2015)
Mabu, S., Chen, C., Lu, N., Shimada, K., Hirasawa, K.: An intrusion-detection model based on fuzzy class-association-rule mining using genetic network programming. IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.) 41(1), 130–139 (2011)
Mishra, N., Mishra, S.: Intrusion detection using IoT (2018)
Owais, S.S.J., Snásel, V., Krömer, P., Abraham, A.: Survey: using genetic algorithm approach in intrusion detection systems techniques. In: 2008 7th Computer Information Systems and Industrial Management Applications, pp. 300–307 (2008)
Panigrah, A., Patra, M.: Fuzzy rough classification models for network intrusion detection. Trans. Mach. Learn. Artif. Intell. 4(2), 7 (2016)
Rao, K.K., SVP Raju, G.: An overview on soft computing techniques. In: Mantri, A., Nandi, S., Kumar, G., Kumar, S. (eds.) HPAGC 2011. CCIS, vol. 169, pp. 9–23. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-22577-2_2
Rao, M.V., Damodaram, A., Charyulu, N.C.B.: Algorithm for clustering with intrusion detection using modified and hashed k - means algorithms. In: Wyld, D.C., Zizka, J., Nagamalai, D. (eds.) Advances in Computer Science, Engineering & Applications, vol. 167, pp. 737–744. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-30111-7_70
Subba, B., Biswas, S., Karmakar, S.: A neural network based system for intrusion detection and attack classification. In: 2016 Twenty Second National Conference on Communication (NCC), pp. 1–6 (2016)
Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1–6 (2009)
Varghese, J.E., Muniyal, B.: An investigation of classification algorithms for intrusion detection system - a quantitative approach. In: 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 2045–2051 (2017)
Weng, F., Jiang, Q., Shi, L., Wu, N.: An intrusion detection system based on the clustering ensemble. In: 2007 International Workshop on Anti-counterfeiting, Security and Identification (ASID), pp. 121–124 (2007)
Xiao, L., Wan, X., Lu, X., Zhang, Y., Wu, D.: IoT security techniques based on machine learning. CoRR abs/1801.06275 (2018)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Varghese, J.E., Muniyal, B. (2019). A Comparative Analysis of Different Soft Computing Techniques for Intrusion Detection System. In: Thampi, S., Madria, S., Wang, G., Rawat, D., Alcaraz Calero, J. (eds) Security in Computing and Communications. SSCC 2018. Communications in Computer and Information Science, vol 969. Springer, Singapore. https://doi.org/10.1007/978-981-13-5826-5_44
Download citation
DOI: https://doi.org/10.1007/978-981-13-5826-5_44
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-5825-8
Online ISBN: 978-981-13-5826-5
eBook Packages: Computer ScienceComputer Science (R0)