A Survey on Anomaly Detection in Network Intrusion Detection System Using Particle Swarm Optimization Based Machine Learning Techniques

The progress in the field of Computer Networks & Internet is increasing with tremendous volume in recent years. This raises important issues with regards to security. Several solutions emerged in the past which provide security at the host or network level. These traditional solutions like antivirus, firewall, spyware & authentication mechanism provide security to some extends but they still face the challenges of inherent system flaws & social engineering attacks. Some interesting solution emerged like Intrusion Detection & Prevention Systems but these too have some problems like detecting & responding in real time & discovering novel attacks. Several Machine Learning techniques like Neural Network, Support Vector Machine, Rough Set etc. Were proposed for making an efficient and Intelligent Network Intrusion Detection System. Also Particle Swarm Optimization is currently attracting considerable interest from the research community, being able to satisfy the growing demand of reliable & intelligent Intrusion Detection System (IDS). Recent development in the field of IDS shows that securing the network with a single technique proves to be insufficient to cater ever increasing threats, as it is very difficult to cope with all vulnerabilities of today’s network. So there is a need to combine all security technologies under a complete secure system that combines the strength of these technologies under a complete secure system that combines the strength of these technologies & thus eventually provide a solid multifaceted well against intrusion attempts. This paper gives an insight into how Particle Swarm Optimization and its variants can be combined with various Machine Learning techniques used for Anomaly Detection in Network Intrusion Detection System by researchers so as to enhance the performance of Intrusion Detection System.

[1]  Marina L. Gavrilova,et al.  Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part I , 2007, ICCSA.

[2]  Li-Yeh Chuang,et al.  Feature Selection using PSO-SVM , 2007, IMECS.

[3]  Yuan Liu,et al.  Wavelet Fuzzy Neural Network Based on Modified QPSO for Network Anomaly Detection , 2010 .

[4]  Ruzhi Xu,et al.  Research intrusion detection based PSO-RBF classifier , 2011, 2011 IEEE 2nd International Conference on Software Engineering and Service Science.

[5]  Xingyu Gong,et al.  Feature selection method for network intrusion based on GQPSO attribute reduction , 2011, 2011 International Conference on Multimedia Technology.

[6]  WenJie Tian,et al.  Network intrusion detection analysis with neural network and particle swarm optimization algorithm , 2010, 2010 Chinese Control and Decision Conference.

[7]  James Kennedy,et al.  Particle swarm optimization , 2002, Proceedings of ICNN'95 - International Conference on Neural Networks.

[8]  Yang Li,et al.  Research on intrusion detection of SVM based on PSO , 2009, 2009 International Conference on Machine Learning and Cybernetics.

[9]  Gabriel Maciá-Fernández,et al.  Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..

[10]  Wang Hai-Bing,et al.  An Intrusion Detection System Model Based on Particle Swarm Reduction , 2010, 2010 Fourth International Conference on Genetic and Evolutionary Computing.

[11]  Zhifeng Chen,et al.  Application of PSO-RBF Neural Network in Network Intrusion Detection , 2009, 2009 Third International Symposium on Intelligent Information Technology Application.

[12]  Huaping Liu,et al.  A New Intelligent Intrusion Detection Method Based on Attribute Reduction and Parameters Optimization of SVM , 2010, 2010 Second International Workshop on Education Technology and Computer Science.

[13]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[14]  Lei Zhang,et al.  Evolutionary flexible neural networks for intrusion detection system , 2006 .

[15]  Xu Hong,et al.  A Real-time Intrusion Detection System Based on PSO-SVM , 2009 .

[16]  M. A. Maarof,et al.  Feature Selection Using Rough Set in Intrusion Detection , 2006, TENCON 2006 - 2006 IEEE Region 10 Conference.

[17]  Anazida Zainal,et al.  Feature Selection Using Rough-DPSO in Anomaly Intrusion Detection , 2007, ICCSA.

[18]  Yuan Liu,et al.  MQPSO Based on Wavelet Neural Network for Network Anomaly Detection , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.

[19]  Hai-Hua Gao,et al.  Quantum Particle swarm optimization based network Intrusion feature selection and Detection , 2008 .

[20]  Jaideep Srivastava,et al.  Managing Cyber Threats: Issues, Approaches, and Challenges (Massive Computing) , 2005 .

[21]  Xingwei Liu,et al.  A New Intrusion Detection Method Based on BPSO-SVM , 2008, 2008 International Symposium on Computational Intelligence and Design.

[22]  Jaideep Srivastava,et al.  Intrusion Detection: A Survey , 2005 .