Open Access Open Access  Restricted Access Subscription or Fee Access

Intrusion Detection System Using BCO and Genetic Algorithm and a Comparison with ACO

Harsimran Kaur, Usvir Kaur, Dr. Dheerendra Singh

Abstract


Intrusion Detection System (IDS) that is increasingly becomes a major part of defense system are used to recognize suspicious activities in a computer system and to protect its security. In the network, an intruder moves between various nodes to trace the path of attack. For the security of computer networks, the Intrusion detection and its prevention play an extremely important role. The traditional intrusion detection system has some limitations, to overcome from them, alerts are made which are exchanged and correlated in a co-operative fashion. So, the rapid development of attack detection is the basic necessity and there is requirement to develop intrusion detection algorithms based on fast machine learning having low false negative rates and high detection rates. In this paper, presents an intelligent learning approach using Bee Colony Optimization (BCO) and Genetic Algorithm (GA) to detect intrusions in the network and their comparison with the Ant Colony Optimization (ACO). The results and the experimental analysis of the hybrid system shows that system can achieve higher accuracy rate in identifying whether the activities are normal or abnormal ones and obtained reasonable detection rate with low false alarm rate.


Keywords


ACO, BCO, GA, Intrusion Detection System

Full Text:

PDF

References


Swati Vishnu, Sonali M. Tidke and Vivek K. Kshirsagar, “Intrusion Detection System Using Genetic Algorithm and Data Mining: An Overview”, International journal of computer and Informatics, ISSN: 2231- 5292, Vol.- 1, Issue- 4, 2012.

Brajesh Patel and Amrita Anand, “Intrusion Detection System and Types of Attacks it Can Detect considering different Protocols: An overview” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue- 8, August 2012.

Afizi Mohd Shukran, Changseok Bae, Afizi Mohd Shukran, Tsung-jung Hsieh and Wei-Chang Yeh, Mohd, “A Novel Anomaly Network Intrusion Detection System Using ABC Algorithm”, International Journal of Innovative Computing, Information and Control, Volume 8, number 12, Dec 2012.

Md. Abdul Mukit, Md. Abu Nasar Bikas and Mohammed Sazzadul Hoque, “An Implementation of Intrusion Detection System Using Genetic Algorithm”, International Journal of Network Security and its Applications (IJNSA), Vol.-4, No. 2, March 2012.

Vineet Richariya and Namita Shrivastava, “Ant Colony Optimization with Classification Algorithms used for Intrusion Detection”, IJCM International Journal of Computation Engineering and Management, Vol. 15 Issue 1, January 2012.

Anup Goyal, Chetan Kumar, “GA-NIDS: A Genetic Algorithm based Network Intrusion Detection System”, 2008.

Xiaonan Wu S, Banzhaf W, “The use of computational intelligence in intrusion detection systems”, Applied Soft Computing, 2010.

M. M. Hassan, “Current Studies on Intrusion Detection System, Genetic Algorithm and Fuzzy Logic”, International Journal of Distributed and Parallel Systems, Vol. 4, No. 2, pp. 35- 47, 2013.

S. Peddabachigari, C. Grosan, Ajith Abraham and J. Thomas, “Modeling intrusion detection system using hybrid intelligent systems”, Journal of Network and Computer Applications, Volume 30, Issue 1, Pages 114–132, January 2013.

Amira Sayed A. Aziz, EL-Ola Hanafi, Mostafa Salama, Aboul ella Hassanien and Sanaa, “Detectors Generation using Genetic Algorithm for a Negative Selection Inspired Anomaly Network Intrusion Detection System", In proceeding of IEEE FedCSIS, At Wroclaw, Poland, pp. 625-631, ISBN 978-83- 60810-51-4, 2012.

http://en.wikipedia.org/wiki/Accuracy_paradox

http://en.wikipedia.org/wiki/Mean_squared_error

http://en.wikipedia.org/wiki/Sensitivity_and_specificity


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.