Abstract
In the proposed study, the past research work has been reviewed which was based on soft computing techniques for IDS and played a better role to detect the intrusion in computer networks. This study reviewed various research articles during 2009–2017 on the intrusion detection system by using soft computing techniques and tried to present a more comprehensive study. In the review process, the data collected has been related to the tools used, dataset class, approaches, performance metrics related details of the soft computing technique and summarizes it with effectiveness. Finally, considering collected statistics, strengths and weaknesses of reviewed articles the findings of this review shall be useful for future researchers in the field of intrusion detection system in their research.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Muniyandi AP, Rajeswari R, Rajaram R (2012) Network anomaly detection by cascading k-means clustering and c4.5 decision tree algorithm. Proc Eng 30:174–182
Kosek AM (2016) Contextual anomaly detection for cyber-physical security in smart grids based on an artificial neural network model. In: Joint workshop on cyberphysical security and resilience in smart grids (CPSR-SG), IEEE, pp 1–6
Morris T, Vaughn R, Dandass Y (2012) A retrofit network intrusion detection system for MODBUS RTU and ASCII industrial control systems. In: 2012 45th Hawaii international conference on system sciences. IEEE, pp 2338–2345
Bawa K, Rana SB (2015) Prevention of black hole attack in manet using addition of genetic algorithm to bacterial foraging optimization. Int J Curr Eng and Technol 5(4)
Branitskiy A, Kotenko I (2015) Network attack detection based on combination of neural, immune and neuro-fuzzy classifiers. In: 2015 IEEE 18th international conference on computational science and engineering (CSE), IEEE, pp 152–159
Jongsuebsuk P, Wattanapongsakorn N, Charnsripinyo C (2013) Network intrusion detection with fuzzy genetic algorithm for unknown attacks. In: 2013 international conference on information networking (ICOIN), IEEE, pp 1–5
Chung YY, Wahid N (2012) A hybrid network intrusion detection system using simplified swarm optimization (SSO). Appl Soft Comput 12(9):3014–3022
Pal D, Parashar A (2014) Improved genetic algorithm for intrusion detection system. In: 2014 international conference on computational intelligence and communication networks (CICN), IEEE, pp 835–839
Wang G, Hao J, Ma J, Huang L (2010) A new approach to intrusion detection using artificial neural networks and fuzzy clustering. Expert Syst Appl 37(9):6225–6232
Zhang H, Li B (2016) Application of an improved multi-layer bp neural network algorithm in intrusion detection. In: 2016 sixth international conference on instrumentation and measurement, computer, communication and control (IMCCC), IEEE, pp 619–622
Ishitaki T, Oda T, Matsuo K, Barolli L, Takizawa M (2015) Performance evaluation of a neural network based intrusion detection system for tor networks considering different hidden units. In: 2015 18th international conference on network-based information systems (NBiS), IEEE, pp 620–627
Tian J, Gao M (2009) Network intrusion detection method based on high speed and precise genetic algorithm neural network. In: International conference on networks security, wireless communications and trusted computing, 2009 (NSWCTC 2009), vol. 2. IEEE, pp 619–622
Naik N (2015) Fuzzy inference based intrusion detection system: FI-Snort. In: 2015 IEEE international conference on computer and information technology; ubiquitous computing and communications; dependable, autonomic and secure computing; pervasive intelligence and computing. IEEE, pp 2062–2067
Kadam PU, Deshmukh M (2016) Real-time intrusion detection with genetic, fuzzy, pattern matching algorithm. In: 2016 3rd international conference on computing for sustainable global development (INDIACom), IEEE, pp 753–758
Bhuyan MH, Bhattacharyya D, Kalita JK (2011) Surveying port scans and their detection methodologies. Comput J 54(10):1565–1581
Hoque MS, Mukit M, Bikas M, Naser A et al (2012) An implementation of intrusion detection system using genetic algorithm. https://arxiv.org/abs/1204.1336
Panda M, Abraham A, Patra MR (2012) A hybrid intelligent approach for network intrusion detection. Proc Eng 30:1–9
Cleetus N, Dhanya K (2014) Genetic algorithm with different feature selection method for intrusion detection. In: 2014 first international conference on computational systems and communications (ICCSC), IEEE, pp 220–225
Jongsuebsuk P, Wattanapongsakorn N, Charnsripinyo C (2013) Real-time intrusion detection with fuzzy genetic algorithm. In: 2013 10th international conference on electrical engineering/electronics, computer, telecommunications and information technology (ECTI-CON), IEEE, pp 1–6
Sommer R, Paxson V (2010) Outside the closed world: on using machine learning for network intrusion detection. In: 2010 IEEE symposium on security and privacy (SP), IEEE, pp 305–316
Yu Y, Wu H (2012) Anomaly intrusion detection based upon data mining techniques and fuzzy logic. In: 2012 IEEE international conference on systems, man, and cybernetics (SMC), IEEE, pp 514–517
Bansal B, Singh K (2015) Rule based intrusion detection system to identify attacking behaviour and severity of attacks. Int J Adv Res Comput Sci Softw Eng 5(1)
Vanjale SB, Mane PB, Patil SV (2015) Wireless LAN intrusion detection and prevention system for malicious access point. In: 2015 2nd international conference on computing for sustainable global development (INDIACom). IEEE, pp 487–490
Midzic A, Avdagic Z, Omanovic S (2016) Intrusion detection system modelling based on neural networks and fuzzy logic. In: 2016 IEEE 20th jubilee international conference on intelligent engineering systems (INES), IEEE, pp 189–194
Aziz ASA, Salama MA, Hassanien AE, Hanafi SE-O (2012) Artificial immune system inspired intrusion detection system using genetic algorithm. Informatica 36(4):347
Chandrasekhar A, Raghuveer K (2013) Intrusion detection technique by using k-means, fuzzy neural network and svm classifiers. In: 2013 international conference on computer communication and informatics (ICCCI), IEEE, pp 1–7
Dastanpour A, Ibrahim S, Mashinchi R (2014) Using genetic algorithm to supporting artificial neural network for intrusion detection system. In: The international conference on computer security and digital investigation (Com-Sec2014), The Society of Digital Information and Wireless Communication, pp 1–13
Das A, Sathya SS (2012) A fuzzy approach to feature reduction in kdd intrusion detection dataset. In: 2012 third international conference on computing communication and networking technologies (ICCCNT), IEEE, pp 1–5
Laszka A, Abbas W, Sastry SS, Vorobeychik Y, Koutsoukos X (2016) Optimal thresholds for intrusion detection systems. In: Proceedings of the symposium and bootcamp on the science of security, ACM, pp 72–81
Jamdagni A, Tan Z, He X, Nanda P, Liu RP (2013) Repids: a multi tier real-time payload-based intrusion detection system. Comput Netw 57(3):811–824
Subba B, Biswas S, Karmakar S (2016) A neural network based system for intrusion detection and attack classification. In: 2016 twenty second national conference on communication (NCC), IEEE, pp 1–6
Brown J, Anwar M, Dozier G.(2016) An evolutionary general regression neural network classifier for intrusion detection. In: 2016 25th international conference on computer communication and networks (ICCCN), IEEE, pp 1–5
Levonevskiy D, Fatkieva R, Ryzhkov S (2015) Network attacks detection using fuzzy logic. In: 2015 XVIII international conference on soft computing and measurements (SCM), IEEE, pp 243–244
Ferriyan A, Thamrin AH, Takeda K, Murai J (2017) Feature selection using genetic algorithm to improve classification in network intrusion detection system. In: 2017 international electronics symposium on knowledge creation and intelligent computing (IES-KCIC). IEEE, pp 46–49
Mukherjee S, Sharma N (2012) Intrusion detection using naive bayes classifier with feature reduction. Proc Technol 4:119128
Hodo E, Bellekens X, Hamilton A, Dubouilh P-L, Iorkyase E, Tach tatzis C, Atkinson R (2016) Threat analysis of iot networks using artificial neural network intrusion detection system. In: 2016 international symposium on networks, computers and communications (ISNCC), vol 245. IEEE, pp 1–6
Zhou F, Yang G (2010) Network intrusion detection using rough sets based parallel genetic algorithm hybrid model. In: 2010 international symposium on intelligence information processing and trusted computing (IPTC), IEEE, pp 686–688
Kumar GR, Mangathayaru N, Narsimha G (2016) An approach for intrusion detection using fuzzy feature clustering. In: International conference on engineering and MIS (ICEMIS), IEEE, pp 1–8
Kumar GR, Mangathayaru N, Narsimha G (2016) Design of novel fuzzy distribution function for dimensionality reduction and intrusion detection. In: International conference on engineering and MIS (ICEMIS), IEEE, pp 1–6
Izakian H, Pedrycz W (2013) Anomaly detection in time series data using a fuzzy c-means clustering. In: 2013 joint IFSA world congress and NAFIPS annual meeting (IFSA/NAFIPS), IEEE, pp 1513–1518
Goni I, Lawal A (2015) A propose neuro-fuzzy-genetic intrusion detection system. Int J Comput Appl 115(8)
Kim J, Kim J, Thu HLT, Kim H (2016) Long short term memory recurrent neural network classifier for intrusion detection. In: 2016 international conference on platform technology and service (PlatCon), IEEE, pp 1–5
Jing X, Wang H, Han R, Li J (2009) Improved genetic algorithm in intrusion detection model based on artificial immune theory. In: International symposium on computer network and multimedia technology, 2009 (CNMT 2009), IEEE, pp 1–4
Garcia JMG (2011) Discrete fuzzy transform applied to computer anomaly detection. In: 2011 annual meeting of the North American fuzzy information processing society (NAFIPS), IEEE, pp 1–4
Wu KX, Hao J, Wang C (2011) Application of fuzzy association rules in intrusion detection. In: 2011 international conference on internet computing and information services (ICICIS), IEEE, pp 269–272
Khan FH, Shams R, Aamir M, Waseem M, Memon M (2015) Intrusion detection in wireless networks using genetic algorithm, In: 2015 2nd international conference on Computing for sustainable global development (INDIACom), IEEE, pp 1830–1835
Hu L, Zhang Z, Tang H, Xie N (2015) An improved intrusion detection framework based on artificial neural networks. In: 2015 11th international conference on natural computation (ICNC), IEEE, pp 1115–1120
Yoon M-K, Mohan S, Choi J, Sha L (2015) Memory heat map: anomaly detection in real-time embedded systems using memory behavior. In: Proceedings of the 52nd annual design automation conference, ACM, p 35
Hassan MMM (2013) Network intrusion detection system using genetic algorithm and fuzzy logic. Int J Innov Res Comput Commun Eng 1(7)
Zhang M, Guo J, Xu B, Gong J (2015) Detecting network intrusion using probabilistic neural network. In: 2015 11th international conference on natural computation (ICNC), IEEE, pp 1151–1158
Kang M-J, Kang J-W (2016) A novel intrusion detection method using deep neural network for in-vehicle network security. In: 2016 IEEE 83rd vehicular technology conference (VTC Spring), IEEE, pp 1–5
Ambusaidi MA, He X, Nanda P, Tan Z (2016) Building an intrusion detection system using a Filter-based feature selection algorithm. IEEE Trans Comput 65(10):2986–2998
Rodas O, Morales G, Alvarez J (2015) A reliable and scalable classification based hybrid ips. In: 2015 IEEE 29th international conference on advanced information networking and applications workshops (WAINA), IEEE, pp 599–604
Majeed PG, Kumar S (2014) Genetic algorithms in intrusion detection systems: a survey. Int J Innov Appl Stud 5(3):233
Elhag S, Fernfiandez A, Bawakid A, Alshomrani S, Herrera F (2015) On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on intrusion detection systems. Expert Syst Appl 42(1):193–202
Potluri S, Diedrich C (2016) Accelerated deep neural networks for enhanced intrusion detection system. In: 2016 IEEE 21st international conference on emerging technologies and factory automation (ETFA), vol 385. IEEE, pp 1–8
Mabu S, Chen C, Lu N, Shimada K, Hirasawa K (2011) An intrusion detection model based on fuzzy class-association-rule mining using genetic network programming. In: IEEE transactions on systems, man, and cybernetics, part C (Applications and Reviews), vol 41(1), pp 130–139
Baoyi W, Feng Z (2009) Dynamic clone selection algorithm based on genetic algorithm for intrusion detection. In: International forum on computer science-technology and applications, 2009 (IFCSTA 2009), vol 1. IEEE, pp 137–140
Yunwu W (2009) Using fuzzy expert system based on genetic algorithms for intrusion detection system. In: International forum on information technology and applications, 400 2009, (IFITA 2009), vol 2. IEEE, pp 221–224
Bhavsar YB, Waghmare KC (2013) Intrusion detection system using data mining technique: support vector machine. Int J Emerg Technol Adv Eng 3(3):581–586
Lei Y, Liu J, Yin H (2016) Intrusion detection techniques based on improved intuitionistic fuzzy neural networks. In: 2016 international conference on intelligent networking and collaborative systems (INCoS). IEEE, pp 518–521
Jamshed MA, Lee J, Moon S, Yun I, Kim D, Lee S, Park K (2012) Kargus: a highly-scalable software-based intrusion detection system. In: Proceedings of the 2012 ACM conference on computer and communications security. ACM, pp 317–328
Guo H, Chen W, Zhang F (2012) Research of intrusion detection based on genetic clustering algorithm. In: 2012 2nd international conference on consumer electronics, communications and networks (CECNet). IEEE, pp 1204–1207
Kidmose E, Stevanovic M, Pedersen JM (2016) Correlating intrusion detection alerts on bot malware infections using neural network. In: 2016 international conference on cyber security and protection of digital services (Cyber Security). IEEE, pp 1–8
Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the kdd cup 99 data set. In: 2009 IEEE symposium on computational intelligence for security and defense applications (CISDA), IEEE, pp 1–6
Ashoor AS, Gore S (2011) Importance of intrusion detection system (IDS). Int J Sci Eng Res 2(1):1–4
Butun I, Morgera SD, Sankar R (2014) A survey of intrusion detection systems in wireless sensor networks. IEEE Commun Surv Tutor 16(1):266–282
Vijayakumar C, RajaRajeswari B, Balasubramanian C (2015) A parallel processing packet inspection by centralized multiple robust distribution system. In: 2015 2nd international conference on electronics and communication systems (ICECS), IEEE, pp 1422–1425
Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv (CSUR) 41(3):15
Ngai E, Hu Y, Wong Y, Chen Y, Sun X (2011) The application of data mining techniques in financial fraud detection: a classification framework and an academic review of literature. Decis Support Syst 50(3):559–569
Garcia-Teodoro P, Diaz-Verdejo J, Macifia-Fernfiandez G, Vfiazquez E (2009) Anomaly-based network intrusion detection: techniques, systems and challenges. Comput Secur 28(1–2):18–28
Gomathy A, Lakshmipathi B (2011) Network intrusion detection using genetic algorithm and neural network. In: Advances in computing and information technology, Springer, Berlin, pp 399–408
Shashikala HM, George R, Shujaee KA (2015) Outlier detection in network data using the betweenness centrality. In: Southeast conference on 2015, IEEE, pp 1–5
Inayat Z, Gani A, Anuar NB, Khan MK, Anwar S (2016) Intrusion response systems: foundations, design, and challenges. J Netw Comput Appl 62:53–74
Jyothsna V, Prasad VR, Prasad KM (2011) A review of anomaly based intrusion detection systems. Int J Comput Appl 28(7):26–35
Liao H-J, Lin C-HR, Lin Y-C, Tung K-Y (2013) Intrusion detection system: a comprehensive review. J Netw Comput Appl 36(1):16–24
Massicotte F, Labiche Y (2012) On the verification and validation of signature based, network intrusion detection systems. In: 2012 IEEE 23rd international symposium on software reliability engineering (ISSRE), IEEE, pp 61–70
Bhuyan MH, Bhattacharyya DK, Kalita JK (2014) Network anomaly detection: methods, systems and tools. IEEE Commun Surv Tutor 16(1):303–336
Shamshirband S, Anuar NB, Kiah MLM, Patel A (2013) An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique. Eng Appl Artif Intell 26(9):2105–2127
Wu SX, Banzhaf W (2010) The use of computational intelligence in intrusion detection systems: a review. Appl Soft Comput 10(1):1–35
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Agarwal, P. (2020). Intrusion Detection System Using Soft Computing Techniques: A Review. In: Kumar, A., Paprzycki, M., Gunjan, V. (eds) ICDSMLA 2019. Lecture Notes in Electrical Engineering, vol 601. Springer, Singapore. https://doi.org/10.1007/978-981-15-1420-3_1
Download citation
DOI: https://doi.org/10.1007/978-981-15-1420-3_1
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-1419-7
Online ISBN: 978-981-15-1420-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)