An Improved Bat Algorithm Driven by Support Vector Machines for Intrusion Detection

Today, the never-ending stream of security threats requires new security solutions capable to deal with large data volumes and high speed network connections in real-time. Intrusion Detection Systems are an omnipresent component of most security systems and may offer a viable answer. In this paper we propose a network anomaly IDS which merges the Support Vector Machines classifier with an improved version of the Bat Algorithm (BA). We use the Binary version of the Swarm Intelligence algorithm to construct a wrapper feature selection method and the standard version to elect the input parameters for SVM. Tests with the NSL-KDD dataset empirically prove our proposed model outperforms simple SVM or similar approaches based on PSO and BA, in terms of attack detection rate and false alarm rate generated after fewer number of iterations.

[1]  Ali A. Ghorbani,et al.  A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.

[2]  Victor Valeriu Patriciu,et al.  Intrusions detection based on Support Vector Machine optimized with swarm intelligence , 2014, 2014 IEEE 9th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI).

[3]  Nadjet Kamel,et al.  A Hybrid Bat Based Feature Selection Approach for Intrusion Detection , 2014, BIC-TA.

[4]  Marc Dacier,et al.  Towards a taxonomy of intrusion-detection systems , 1999, Comput. Networks.

[5]  Slobodan Petrovic,et al.  Improving Effectiveness of Intrusion Detection by Correlation Feature Selection , 2010, ARES.

[6]  Geoffrey I. Webb,et al.  Encyclopedia of Machine Learning , 2011, Encyclopedia of Machine Learning.

[7]  Xingwei Liu,et al.  A New Intrusion Detection Method Based on BPSO-SVM , 2008, 2008 International Symposium on Computational Intelligence and Design.

[8]  Xin-She Yang,et al.  A New Metaheuristic Bat-Inspired Algorithm , 2010, NICSO.

[9]  Ian H. Witten,et al.  The WEKA data mining software: an update , 2009, SKDD.

[10]  Hui-Hua Yang,et al.  Ant colony optimization based network intrusion feature selection and detection , 2005, 2005 International Conference on Machine Learning and Cybernetics.

[11]  Zbigniew Kotulski,et al.  New Unknown Attack Detection with the Neural Network–Based IDS , 2014 .

[12]  Xin-She Yang,et al.  BBA: A Binary Bat Algorithm for Feature Selection , 2012, 2012 25th SIBGRAPI Conference on Graphics, Patterns and Images.

[13]  Valentin Sgarciu,et al.  Enhanced intrusion detection system based on bat algorithm-support vector machine , 2014, 2014 11th International Conference on Security and Cryptography (SECRYPT).

[14]  Xin-She Yang,et al.  Bat algorithm: literature review and applications , 2013, Int. J. Bio Inspired Comput..

[15]  Xin-She Yang,et al.  Firefly Algorithms for Multimodal Optimization , 2009, SAGA.

[16]  Xu Hong,et al.  A Real-time Intrusion Detection System Based on PSO-SVM , 2009 .

[17]  Jun Wang,et al.  A real time IDSs based on artificial Bee Colony-support vector machine algorithm , 2010, Third International Workshop on Advanced Computational Intelligence.