Genetic Programming Feature Extraction with Different Robust Classifiers for Network Intrusion Detection

In this paper, we compare the performance of three traditional robust classifiers (Neural Networks, Support Vector Machines, and Decision Trees) with and without utilizing multi-objective genetic programming in the feature extraction phase. This work argues that effective feature extraction can significantly enhance the performance of these classifiers. We have applied these three classifiers stand alone to real world five datasets from the UCI machine learning database and also to network intrusion “KDD-99 cup” dataset. Then, the experiments were repeated by adding the feature extraction phase. The results of the two approaches are compared and conclude that the effective method is to evolve optimal feature extractors that transform input pattern space into a decision space in which the performance of traditional robust classifiers can be enhanced. General Terms Pattern Recognition, Classification, Network Intrusion.

[1]  William B. Langdon,et al.  Application of Genetic Programming to Induction of Linear Classification Trees , 2000, EuroGP.

[2]  Gilles Louppe,et al.  Independent consultant , 2013 .

[3]  Carlos Martín-Vide,et al.  Evolutionary Design of Intrusion Detection Programs , 2007, Int. J. Netw. Secur..

[4]  Amara Lynn Graps,et al.  An introduction to wavelets , 1995 .

[5]  Huan Liu,et al.  Feature Selection: An Ever Evolving Frontier in Data Mining , 2010, FSDM.

[6]  Zhiyong Zeng,et al.  Feature Selection Based on Dependency Margin , 2015, IEEE Transactions on Cybernetics.

[7]  Wei Lu,et al.  Detecting New Forms of Network Intrusion Using Genetic Programming , 2004, Comput. Intell..

[8]  Chris Triggs,et al.  Mathematics prevents bloat [genetic programming] , 2005, 2005 IEEE Congress on Evolutionary Computation.

[9]  Kamel Faraoun,et al.  Genetic Programming Approach for Multi-Category Pattern Classification Applied to Network Intrusions Detection , 2006, Int. Arab J. Inf. Technol..

[10]  Krzysztof Krawiec,et al.  Genetic Programming-based Construction of Features for Machine Learning and Knowledge Discovery Tasks , 2002, Genetic Programming and Evolvable Machines.

[11]  A. Bennett The Origin of Species by means of Natural Selection; or the Preservation of Favoured Races in the Struggle for Life , 1872, Nature.

[12]  Walter Alden Tackett,et al.  Genetic Programming for Feature Discovery and Image Discrimination , 1993, ICGA.

[13]  Huan Liu,et al.  Toward integrating feature selection algorithms for classification and clustering , 2005, IEEE Transactions on Knowledge and Data Engineering.

[14]  Mengjie Zhang,et al.  Particle Swarm Optimization for Feature Selection in Classification: A Multi-Objective Approach , 2013, IEEE Transactions on Cybernetics.

[15]  Annie S. Wu,et al.  Bloat is Unnatural: An Analysis of Changes in Variable Chromosome Length Absent Selection Pressure , 2004 .

[16]  Huan Liu,et al.  Manipulating Data and Dimension Reduction Methods: Feature Selection , 2009, Encyclopedia of Complexity and Systems Science.

[17]  Nguyen Xuan Hoai,et al.  Malware detection using genetic programming , 2014, the 2014 Seventh IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA).

[18]  Henri Luchian,et al.  Feature Extraction Using Genetic Programming with Applications in Malware Detection , 2015, 2015 17th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC).

[19]  John R. Koza,et al.  Genetic programming - on the programming of computers by means of natural selection , 1993, Complex adaptive systems.

[20]  Grant Dick,et al.  Implicitly Controlling Bloat in Genetic Programming , 2010, IEEE Transactions on Evolutionary Computation.

[21]  Matthew J. Streeter,et al.  The Root Causes of Code Growth in Genetic Programming , 2003, EuroGP.

[22]  Erik D. Goodman,et al.  Genetic programming for improved data mining: application to the biochemistry of protein interactions , 1996 .

[23]  Ruhul A. Sarker,et al.  Survey of Uses of Evolutionary Computation Algorithms and Swarm Intelligence for Network Intrusion Detection , 2015, Int. J. Comput. Intell. Appl..

[24]  Malcolm I. Heywood,et al.  A Linear Genetic Programming Approach to Intrusion Detection , 2003, GECCO.

[25]  Peter Rockett,et al.  Multi-class pattern classification using single, multi-dimensional feature-space feature extraction evolved by multi-objective genetic programming and its application to network intrusion detection , 2011, Genetic Programming and Evolvable Machines.

[26]  Arturo Ribagorda,et al.  Improving Network Intrusion Detection by Means of Domain-Aware Genetic Programming , 2010, 2010 International Conference on Availability, Reliability and Security.

[27]  Manabu Kotani,et al.  Feature extraction using evolutionary computation , 1999, Proceedings of the 1999 Congress on Evolutionary Computation-CEC99 (Cat. No. 99TH8406).