Enhanced intrusion detection system based on bat algorithm-support vector machine

As new security intrusions arise so does the demand for viable intrusion detection systems These solutions must deal with huge data volumes, high speed network traffics and countervail new and various types of security threats. In this paper we combine existing technologies to construct an Anomaly based Intrusion Detection System. Our approach improves the Support Vector Machine classifier by exploiting the advantages of a new swarm intelligence algorithm inspired by the environment of microbats (Bat Algorithm). The main contribution of our paper is the novel feature selection model based on Binary Bat Algorithm with Levy flights. To test our model we use the NSL-KDD data set and empirically prove that Levy flights can upgrade the exploration of standard Binary Bat Algorithm. Furthermore, our approach succeeds to enhance the default SVM classifier and we obtain good performance measures in terms of accuracy (90.06%), attack detection rate (95.05%) and false alarm rate (4.4%) for unknown attacks.

[1]  Xin-She Yang,et al.  A New Metaheuristic Bat-Inspired Algorithm , 2010, NICSO.

[2]  Xu Hong,et al.  A Real-time Intrusion Detection System Based on PSO-SVM , 2009 .

[3]  Xin-She Yang,et al.  Binary bat algorithm , 2013, Neural Computing and Applications.

[4]  Yanzhi Li,et al.  A Detection Method of Network Intrusion Based on SVM and Ant Colony Algorithm , 2012, ITCS 2012.

[5]  Ian H. Witten,et al.  The WEKA data mining software: an update , 2009, SKDD.

[6]  Sumeet Dua,et al.  Data Mining and Machine Learning in Cybersecurity , 2011 .

[7]  Xin-She Yang,et al.  Bat algorithm: literature review and applications , 2013, Int. J. Bio Inspired Comput..

[8]  Jian Xie,et al.  A Novel Bat Algorithm Based on Differential Operator and Lévy Flights Trajectory , 2013, Comput. Intell. Neurosci..

[9]  Xin-She Yang,et al.  Firefly Algorithm, Lévy Flights and Global Optimization , 2010, SGAI Conf..

[10]  Ali A. Ghorbani,et al.  A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.

[11]  Xin-She Yang,et al.  Cuckoo Search via Lévy flights , 2009, 2009 World Congress on Nature & Biologically Inspired Computing (NaBIC).

[12]  Jun Wang,et al.  A real time IDSs based on artificial Bee Colony-support vector machine algorithm , 2010, Third International Workshop on Advanced Computational Intelligence.

[13]  Zbigniew Kotulski,et al.  New Unknown Attack Detection with the Neural Network–Based IDS , 2014 .

[14]  Xian Du,et al.  Classical Machine-Learning Paradigms for Data Mining , 2016 .

[15]  Xin-She Yang,et al.  Swarm-Based Metaheuristic Algorithms and No-Free-Lunch Theorems , 2012 .