Skip to main content

Intrusion Detection System Using Soft Computing Techniques: A Review

  • Conference paper
  • First Online:
ICDSMLA 2019

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 601))

  • 101 Accesses

Abstract

In the proposed study, the past research work has been reviewed which was based on soft computing techniques for IDS and played a better role to detect the intrusion in computer networks. This study reviewed various research articles during 2009–2017 on the intrusion detection system by using soft computing techniques and tried to present a more comprehensive study. In the review process, the data collected has been related to the tools used, dataset class, approaches, performance metrics related details of the soft computing technique and summarizes it with effectiveness. Finally, considering collected statistics, strengths and weaknesses of reviewed articles the findings of this review shall be useful for future researchers in the field of intrusion detection system in their research.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Muniyandi AP, Rajeswari R, Rajaram R (2012) Network anomaly detection by cascading k-means clustering and c4.5 decision tree algorithm. Proc Eng 30:174–182

    Google Scholar 

  2. Kosek AM (2016) Contextual anomaly detection for cyber-physical security in smart grids based on an artificial neural network model. In: Joint workshop on cyberphysical security and resilience in smart grids (CPSR-SG), IEEE, pp 1–6

    Google Scholar 

  3. Morris T, Vaughn R, Dandass Y (2012) A retrofit network intrusion detection system for MODBUS RTU and ASCII industrial control systems. In: 2012 45th Hawaii international conference on system sciences. IEEE, pp 2338–2345

    Google Scholar 

  4. Bawa K, Rana SB (2015) Prevention of black hole attack in manet using addition of genetic algorithm to bacterial foraging optimization. Int J Curr Eng and Technol 5(4)

    Google Scholar 

  5. Branitskiy A, Kotenko I (2015) Network attack detection based on combination of neural, immune and neuro-fuzzy classifiers. In: 2015 IEEE 18th international conference on computational science and engineering (CSE), IEEE, pp 152–159

    Google Scholar 

  6. Jongsuebsuk P, Wattanapongsakorn N, Charnsripinyo C (2013) Network intrusion detection with fuzzy genetic algorithm for unknown attacks. In: 2013 international conference on information networking (ICOIN), IEEE, pp 1–5

    Google Scholar 

  7. Chung YY, Wahid N (2012) A hybrid network intrusion detection system using simplified swarm optimization (SSO). Appl Soft Comput 12(9):3014–3022

    Article  Google Scholar 

  8. Pal D, Parashar A (2014) Improved genetic algorithm for intrusion detection system. In: 2014 international conference on computational intelligence and communication networks (CICN), IEEE, pp 835–839

    Google Scholar 

  9. Wang G, Hao J, Ma J, Huang L (2010) A new approach to intrusion detection using artificial neural networks and fuzzy clustering. Expert Syst Appl 37(9):6225–6232

    Article  Google Scholar 

  10. Zhang H, Li B (2016) Application of an improved multi-layer bp neural network algorithm in intrusion detection. In: 2016 sixth international conference on instrumentation and measurement, computer, communication and control (IMCCC), IEEE, pp 619–622

    Google Scholar 

  11. Ishitaki T, Oda T, Matsuo K, Barolli L, Takizawa M (2015) Performance evaluation of a neural network based intrusion detection system for tor networks considering different hidden units. In: 2015 18th international conference on network-based information systems (NBiS), IEEE, pp 620–627

    Google Scholar 

  12. Tian J, Gao M (2009) Network intrusion detection method based on high speed and precise genetic algorithm neural network. In: International conference on networks security, wireless communications and trusted computing, 2009 (NSWCTC 2009), vol. 2. IEEE, pp 619–622

    Google Scholar 

  13. Naik N (2015) Fuzzy inference based intrusion detection system: FI-Snort. In: 2015 IEEE international conference on computer and information technology; ubiquitous computing and communications; dependable, autonomic and secure computing; pervasive intelligence and computing. IEEE, pp 2062–2067

    Google Scholar 

  14. Kadam PU, Deshmukh M (2016) Real-time intrusion detection with genetic, fuzzy, pattern matching algorithm. In: 2016 3rd international conference on computing for sustainable global development (INDIACom), IEEE, pp 753–758

    Google Scholar 

  15. Bhuyan MH, Bhattacharyya D, Kalita JK (2011) Surveying port scans and their detection methodologies. Comput J 54(10):1565–1581

    Article  Google Scholar 

  16. Hoque MS, Mukit M, Bikas M, Naser A et al (2012) An implementation of intrusion detection system using genetic algorithm. https://arxiv.org/abs/1204.1336

  17. Panda M, Abraham A, Patra MR (2012) A hybrid intelligent approach for network intrusion detection. Proc Eng 30:1–9

    Article  Google Scholar 

  18. Cleetus N, Dhanya K (2014) Genetic algorithm with different feature selection method for intrusion detection. In: 2014 first international conference on computational systems and communications (ICCSC), IEEE, pp 220–225

    Google Scholar 

  19. Jongsuebsuk P, Wattanapongsakorn N, Charnsripinyo C (2013) Real-time intrusion detection with fuzzy genetic algorithm. In: 2013 10th international conference on electrical engineering/electronics, computer, telecommunications and information technology (ECTI-CON), IEEE, pp 1–6

    Google Scholar 

  20. Sommer R, Paxson V (2010) Outside the closed world: on using machine learning for network intrusion detection. In: 2010 IEEE symposium on security and privacy (SP), IEEE, pp 305–316

    Google Scholar 

  21. Yu Y, Wu H (2012) Anomaly intrusion detection based upon data mining techniques and fuzzy logic. In: 2012 IEEE international conference on systems, man, and cybernetics (SMC), IEEE, pp 514–517

    Google Scholar 

  22. Bansal B, Singh K (2015) Rule based intrusion detection system to identify attacking behaviour and severity of attacks. Int J Adv Res Comput Sci Softw Eng 5(1)

    Google Scholar 

  23. Vanjale SB, Mane PB, Patil SV (2015) Wireless LAN intrusion detection and prevention system for malicious access point. In: 2015 2nd international conference on computing for sustainable global development (INDIACom). IEEE, pp 487–490

    Google Scholar 

  24. Midzic A, Avdagic Z, Omanovic S (2016) Intrusion detection system modelling based on neural networks and fuzzy logic. In: 2016 IEEE 20th jubilee international conference on intelligent engineering systems (INES), IEEE, pp 189–194

    Google Scholar 

  25. Aziz ASA, Salama MA, Hassanien AE, Hanafi SE-O (2012) Artificial immune system inspired intrusion detection system using genetic algorithm. Informatica 36(4):347

    Google Scholar 

  26. Chandrasekhar A, Raghuveer K (2013) Intrusion detection technique by using k-means, fuzzy neural network and svm classifiers. In: 2013 international conference on computer communication and informatics (ICCCI), IEEE, pp 1–7

    Google Scholar 

  27. Dastanpour A, Ibrahim S, Mashinchi R (2014) Using genetic algorithm to supporting artificial neural network for intrusion detection system. In: The international conference on computer security and digital investigation (Com-Sec2014), The Society of Digital Information and Wireless Communication, pp 1–13

    Google Scholar 

  28. Das A, Sathya SS (2012) A fuzzy approach to feature reduction in kdd intrusion detection dataset. In: 2012 third international conference on computing communication and networking technologies (ICCCNT), IEEE, pp 1–5

    Google Scholar 

  29. Laszka A, Abbas W, Sastry SS, Vorobeychik Y, Koutsoukos X (2016) Optimal thresholds for intrusion detection systems. In: Proceedings of the symposium and bootcamp on the science of security, ACM, pp 72–81

    Google Scholar 

  30. Jamdagni A, Tan Z, He X, Nanda P, Liu RP (2013) Repids: a multi tier real-time payload-based intrusion detection system. Comput Netw 57(3):811–824

    Article  Google Scholar 

  31. Subba B, Biswas S, Karmakar S (2016) A neural network based system for intrusion detection and attack classification. In: 2016 twenty second national conference on communication (NCC), IEEE, pp 1–6

    Google Scholar 

  32. Brown J, Anwar M, Dozier G.(2016) An evolutionary general regression neural network classifier for intrusion detection. In: 2016 25th international conference on computer communication and networks (ICCCN), IEEE, pp 1–5

    Google Scholar 

  33. Levonevskiy D, Fatkieva R, Ryzhkov S (2015) Network attacks detection using fuzzy logic. In: 2015 XVIII international conference on soft computing and measurements (SCM), IEEE, pp 243–244

    Google Scholar 

  34. Ferriyan A, Thamrin AH, Takeda K, Murai J (2017) Feature selection using genetic algorithm to improve classification in network intrusion detection system. In: 2017 international electronics symposium on knowledge creation and intelligent computing (IES-KCIC). IEEE, pp 46–49

    Google Scholar 

  35. Mukherjee S, Sharma N (2012) Intrusion detection using naive bayes classifier with feature reduction. Proc Technol 4:119128

    Google Scholar 

  36. Hodo E, Bellekens X, Hamilton A, Dubouilh P-L, Iorkyase E, Tach tatzis C, Atkinson R (2016) Threat analysis of iot networks using artificial neural network intrusion detection system. In: 2016 international symposium on networks, computers and communications (ISNCC), vol 245. IEEE, pp 1–6

    Google Scholar 

  37. Zhou F, Yang G (2010) Network intrusion detection using rough sets based parallel genetic algorithm hybrid model. In: 2010 international symposium on intelligence information processing and trusted computing (IPTC), IEEE, pp 686–688

    Google Scholar 

  38. Kumar GR, Mangathayaru N, Narsimha G (2016) An approach for intrusion detection using fuzzy feature clustering. In: International conference on engineering and MIS (ICEMIS), IEEE, pp 1–8

    Google Scholar 

  39. Kumar GR, Mangathayaru N, Narsimha G (2016) Design of novel fuzzy distribution function for dimensionality reduction and intrusion detection. In: International conference on engineering and MIS (ICEMIS), IEEE, pp 1–6

    Google Scholar 

  40. Izakian H, Pedrycz W (2013) Anomaly detection in time series data using a fuzzy c-means clustering. In: 2013 joint IFSA world congress and NAFIPS annual meeting (IFSA/NAFIPS), IEEE, pp 1513–1518

    Google Scholar 

  41. Goni I, Lawal A (2015) A propose neuro-fuzzy-genetic intrusion detection system. Int J Comput Appl 115(8)

    Google Scholar 

  42. Kim J, Kim J, Thu HLT, Kim H (2016) Long short term memory recurrent neural network classifier for intrusion detection. In: 2016 international conference on platform technology and service (PlatCon), IEEE, pp 1–5

    Google Scholar 

  43. Jing X, Wang H, Han R, Li J (2009) Improved genetic algorithm in intrusion detection model based on artificial immune theory. In: International symposium on computer network and multimedia technology, 2009 (CNMT 2009), IEEE, pp 1–4

    Google Scholar 

  44. Garcia JMG (2011) Discrete fuzzy transform applied to computer anomaly detection. In: 2011 annual meeting of the North American fuzzy information processing society (NAFIPS), IEEE, pp 1–4

    Google Scholar 

  45. Wu KX, Hao J, Wang C (2011) Application of fuzzy association rules in intrusion detection. In: 2011 international conference on internet computing and information services (ICICIS), IEEE, pp 269–272

    Google Scholar 

  46. Khan FH, Shams R, Aamir M, Waseem M, Memon M (2015) Intrusion detection in wireless networks using genetic algorithm, In: 2015 2nd international conference on Computing for sustainable global development (INDIACom), IEEE, pp 1830–1835

    Google Scholar 

  47. Hu L, Zhang Z, Tang H, Xie N (2015) An improved intrusion detection framework based on artificial neural networks. In: 2015 11th international conference on natural computation (ICNC), IEEE, pp 1115–1120

    Google Scholar 

  48. Yoon M-K, Mohan S, Choi J, Sha L (2015) Memory heat map: anomaly detection in real-time embedded systems using memory behavior. In: Proceedings of the 52nd annual design automation conference, ACM, p 35

    Google Scholar 

  49. Hassan MMM (2013) Network intrusion detection system using genetic algorithm and fuzzy logic. Int J Innov Res Comput Commun Eng 1(7)

    Google Scholar 

  50. Zhang M, Guo J, Xu B, Gong J (2015) Detecting network intrusion using probabilistic neural network. In: 2015 11th international conference on natural computation (ICNC), IEEE, pp 1151–1158

    Google Scholar 

  51. Kang M-J, Kang J-W (2016) A novel intrusion detection method using deep neural network for in-vehicle network security. In: 2016 IEEE 83rd vehicular technology conference (VTC Spring), IEEE, pp 1–5

    Google Scholar 

  52. Ambusaidi MA, He X, Nanda P, Tan Z (2016) Building an intrusion detection system using a Filter-based feature selection algorithm. IEEE Trans Comput 65(10):2986–2998

    Article  MathSciNet  MATH  Google Scholar 

  53. Rodas O, Morales G, Alvarez J (2015) A reliable and scalable classification based hybrid ips. In: 2015 IEEE 29th international conference on advanced information networking and applications workshops (WAINA), IEEE, pp 599–604

    Google Scholar 

  54. Majeed PG, Kumar S (2014) Genetic algorithms in intrusion detection systems: a survey. Int J Innov Appl Stud 5(3):233

    Google Scholar 

  55. Elhag S, Fernfiandez A, Bawakid A, Alshomrani S, Herrera F (2015) On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on intrusion detection systems. Expert Syst Appl 42(1):193–202

    Article  Google Scholar 

  56. Potluri S, Diedrich C (2016) Accelerated deep neural networks for enhanced intrusion detection system. In: 2016 IEEE 21st international conference on emerging technologies and factory automation (ETFA), vol 385. IEEE, pp 1–8

    Google Scholar 

  57. Mabu S, Chen C, Lu N, Shimada K, Hirasawa K (2011) An intrusion detection model based on fuzzy class-association-rule mining using genetic network programming. In: IEEE transactions on systems, man, and cybernetics, part C (Applications and Reviews), vol 41(1), pp 130–139

    Google Scholar 

  58. Baoyi W, Feng Z (2009) Dynamic clone selection algorithm based on genetic algorithm for intrusion detection. In: International forum on computer science-technology and applications, 2009 (IFCSTA 2009), vol 1. IEEE, pp 137–140

    Google Scholar 

  59. Yunwu W (2009) Using fuzzy expert system based on genetic algorithms for intrusion detection system. In: International forum on information technology and applications, 400 2009, (IFITA 2009), vol 2. IEEE, pp 221–224

    Google Scholar 

  60. Bhavsar YB, Waghmare KC (2013) Intrusion detection system using data mining technique: support vector machine. Int J Emerg Technol Adv Eng 3(3):581–586

    Google Scholar 

  61. Lei Y, Liu J, Yin H (2016) Intrusion detection techniques based on improved intuitionistic fuzzy neural networks. In: 2016 international conference on intelligent networking and collaborative systems (INCoS). IEEE, pp 518–521

    Google Scholar 

  62. Jamshed MA, Lee J, Moon S, Yun I, Kim D, Lee S, Park K (2012) Kargus: a highly-scalable software-based intrusion detection system. In: Proceedings of the 2012 ACM conference on computer and communications security. ACM, pp 317–328

    Google Scholar 

  63. Guo H, Chen W, Zhang F (2012) Research of intrusion detection based on genetic clustering algorithm. In: 2012 2nd international conference on consumer electronics, communications and networks (CECNet). IEEE, pp 1204–1207

    Google Scholar 

  64. Kidmose E, Stevanovic M, Pedersen JM (2016) Correlating intrusion detection alerts on bot malware infections using neural network. In: 2016 international conference on cyber security and protection of digital services (Cyber Security). IEEE, pp 1–8

    Google Scholar 

  65. Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the kdd cup 99 data set. In: 2009 IEEE symposium on computational intelligence for security and defense applications (CISDA), IEEE, pp 1–6

    Google Scholar 

  66. Ashoor AS, Gore S (2011) Importance of intrusion detection system (IDS). Int J Sci Eng Res 2(1):1–4

    Google Scholar 

  67. Butun I, Morgera SD, Sankar R (2014) A survey of intrusion detection systems in wireless sensor networks. IEEE Commun Surv Tutor 16(1):266–282

    Article  Google Scholar 

  68. Vijayakumar C, RajaRajeswari B, Balasubramanian C (2015) A parallel processing packet inspection by centralized multiple robust distribution system. In: 2015 2nd international conference on electronics and communication systems (ICECS), IEEE, pp 1422–1425

    Google Scholar 

  69. Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv (CSUR) 41(3):15

    Google Scholar 

  70. Ngai E, Hu Y, Wong Y, Chen Y, Sun X (2011) The application of data mining techniques in financial fraud detection: a classification framework and an academic review of literature. Decis Support Syst 50(3):559–569

    Article  Google Scholar 

  71. Garcia-Teodoro P, Diaz-Verdejo J, Macifia-Fernfiandez G, Vfiazquez E (2009) Anomaly-based network intrusion detection: techniques, systems and challenges. Comput Secur 28(1–2):18–28

    Google Scholar 

  72. Gomathy A, Lakshmipathi B (2011) Network intrusion detection using genetic algorithm and neural network. In: Advances in computing and information technology, Springer, Berlin, pp 399–408

    Google Scholar 

  73. Shashikala HM, George R, Shujaee KA (2015) Outlier detection in network data using the betweenness centrality. In: Southeast conference on 2015, IEEE, pp 1–5

    Google Scholar 

  74. Inayat Z, Gani A, Anuar NB, Khan MK, Anwar S (2016) Intrusion response systems: foundations, design, and challenges. J Netw Comput Appl 62:53–74

    Article  Google Scholar 

  75. Jyothsna V, Prasad VR, Prasad KM (2011) A review of anomaly based intrusion detection systems. Int J Comput Appl 28(7):26–35

    Google Scholar 

  76. Liao H-J, Lin C-HR, Lin Y-C, Tung K-Y (2013) Intrusion detection system: a comprehensive review. J Netw Comput Appl 36(1):16–24

    Article  Google Scholar 

  77. Massicotte F, Labiche Y (2012) On the verification and validation of signature based, network intrusion detection systems. In: 2012 IEEE 23rd international symposium on software reliability engineering (ISSRE), IEEE, pp 61–70

    Google Scholar 

  78. Bhuyan MH, Bhattacharyya DK, Kalita JK (2014) Network anomaly detection: methods, systems and tools. IEEE Commun Surv Tutor 16(1):303–336

    Article  Google Scholar 

  79. Shamshirband S, Anuar NB, Kiah MLM, Patel A (2013) An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique. Eng Appl Artif Intell 26(9):2105–2127

    Article  Google Scholar 

  80. Wu SX, Banzhaf W (2010) The use of computational intelligence in intrusion detection systems: a review. Appl Soft Comput 10(1):1–35

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pooja Agarwal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Agarwal, P. (2020). Intrusion Detection System Using Soft Computing Techniques: A Review. In: Kumar, A., Paprzycki, M., Gunjan, V. (eds) ICDSMLA 2019. Lecture Notes in Electrical Engineering, vol 601. Springer, Singapore. https://doi.org/10.1007/978-981-15-1420-3_1

Download citation

Publish with us

Policies and ethics