Open Access   Article Go Back

Hybrid Particle Swarm Optimization and Fuzzy C-Means Clustering for Network Intrusion Detection

Partha Sarathi Bhattacharjee1 , Arif Iqbal Mozumder2 , Shahin Ara Begum3

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-9 , Page no. 116-122, Sep-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i9.116122

Online published on Sep 30, 2018

Copyright © Partha Sarathi Bhattacharjee, Arif Iqbal Mozumder, Shahin Ara Begum . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Partha Sarathi Bhattacharjee, Arif Iqbal Mozumder, Shahin Ara Begum, “Hybrid Particle Swarm Optimization and Fuzzy C-Means Clustering for Network Intrusion Detection,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.116-122, 2018.

MLA Style Citation: Partha Sarathi Bhattacharjee, Arif Iqbal Mozumder, Shahin Ara Begum "Hybrid Particle Swarm Optimization and Fuzzy C-Means Clustering for Network Intrusion Detection." International Journal of Computer Sciences and Engineering 6.9 (2018): 116-122.

APA Style Citation: Partha Sarathi Bhattacharjee, Arif Iqbal Mozumder, Shahin Ara Begum, (2018). Hybrid Particle Swarm Optimization and Fuzzy C-Means Clustering for Network Intrusion Detection. International Journal of Computer Sciences and Engineering, 6(9), 116-122.

BibTex Style Citation:
@article{Bhattacharjee_2018,
author = {Partha Sarathi Bhattacharjee, Arif Iqbal Mozumder, Shahin Ara Begum},
title = {Hybrid Particle Swarm Optimization and Fuzzy C-Means Clustering for Network Intrusion Detection},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2018},
volume = {6},
Issue = {9},
month = {9},
year = {2018},
issn = {2347-2693},
pages = {116-122},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2831},
doi = {https://doi.org/10.26438/ijcse/v6i9.116122}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i9.116122}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2831
TI - Hybrid Particle Swarm Optimization and Fuzzy C-Means Clustering for Network Intrusion Detection
T2 - International Journal of Computer Sciences and Engineering
AU - Partha Sarathi Bhattacharjee, Arif Iqbal Mozumder, Shahin Ara Begum
PY - 2018
DA - 2018/09/30
PB - IJCSE, Indore, INDIA
SP - 116-122
IS - 9
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
808 518 downloads 313 downloads
  
  
           

Abstract

Intrusion Detection systems (IDS) play an important role in network security and protection. Intrusion detection system uses either misuse or anomaly based techniques to identify malicious activities. To detect malicious activity, misuse detection systems is used to identify signatures or previously known malicious activities. On the other hand, anomaly based systems is used to identify unknown attacks. Intrusion detection system is now an essential tool to protect the networks by monitoring inbound and outbound activities and identifying suspicious patterns that may indicate a system attack. In recent years, some researchers have employed data mining techniques for developing IDS. In this paper, hybrid Particle Swarm Optimization (PSO) and Fuzzy c-means clustering for network Intrusion Detection is proposed to identify intrusion over NSL-KDD dataset. An attempt has been made to cluster the dataset into normal and the major attack categories i.e. DoS, R2L, U2R and Probe. The experimental results demonstrate the efficiency of the proposed approach.

Key-Words / Index Term

IDS, Fuzzy c-means Algorithm, PSO, Mutual Information, NSL-KDD Dataset

References

[1] Roger Storlokken (2007), “Labelling clusters in an anomaly based IDS by means of clustering quality indexes”, Department of Computer Science and Media Technology,Gjovik University College
[2] M.Shivakumar, R.Subalakshmi, S. Shanthakumari and S.John Joseph (2013), “Architecture for Network-Intrusion Detection and Response in open Networks using Analyzer Mobile Agents”, IJSRNSC, Vol.1, Issue 4, pp.3-7
[3] Raghunath ,B. R. and Mahadeo, S. N. (2008), “Network Intrusion Detection System (NIDS)”, International Conference on Emerging Trends in Engineering and Technology”, IEEE, 2008
[4] Benaicha, S. E., Saoudi, L., Guermeche, B., Eddine, S. and Lounis, O. (2014), “Intrusion detection system using genetic algorithm”, Science and Information Conference (SAI), IEEE-2014, pp. 564–568
[5] Manmohan Dagar and Rashmi Popli (2018), “Honeypots: Virtual Network Intrusion Monitoring System”, IJSRNSC, Vol.6, Issue 2, pp.45-49
[6] Zhao, Y. (2016), “Network intrusion detection system model based on data mining”,17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), IEEE, Shanghai, China, pp. 155–160
[7] D Gupta, S Singhai, S Malik and A Singh (2016), “Network intrusion detection system using various data mining techniques”, IEEE International Conference on Research Advances in Integrated Navigation Systems (RAINS)
[8] A.K. Siddique and T Farooqui,, (2017), “Improved Ensemble Technique based on Support Vector Machine and Neural Network for Intrusion Detection System”, International Journal Online of Science, 3(11)
[9] Harish, B.S. and Kumar, S.A., (2017), “Anomaly based intrusion detection using modified fuzzy clustering”, International Journal of Interactive Multimedia and Artificial Intelligence, 4(6), pp.54-59
[10] R.K. Das, M Panda, S Dash and S.S Dash (2018) “Application of Artificial Immune System Algorithms in Anomaly Detection”, Progress in Computing, Analytics and Networking, Springer, Singapore, pp. 687-694
[11] A. Panigrahi and M.R. Patra (2018), “A Layered Approach to Network Intrusion Detection Using Rule Learning Classifiers with Nature-Inspired Feature Selection”, In Progress in Computing, Analytics and Networking, Springer, Singapore, pp. 215-223
[12] R Sahani, C Rout, J.C. Badajena, A.K. Jena and H. Das (2018), “Classification of Intrusion Detection Using Data Mining Techniques”, Progress in Computing, Analytics and Networking, Springer, Singapore, pp. 753-764
[13] A Ahmed, Dowlat Elngar, A. El, Mohamed, A. and Fayed, F. M. Ghaleb (2013), “A Real-Time Anomaly Network Intrusion Detection System with High Accuracy”, Inf. Sci. Lett. 2, No. 2, pp.49-56
[14] Lan, Yuan-Dong (2017), "A Hybrid Feature Selection based on Mutual Information and Genetic Algorithm.", Indonesian Journal of Electrical Engineering and Computer Science 7, No. 1, pp. 214-225.
[15] Nojun Kwak, , Choi, Chong-Ho (2002), “Input Feature Selection by Mutual Information Based on Parzen Window”, IEEE transactions on pattern analysis and machine intelligence, Vol. 24, no. 12
[16] Tavallaee, Mahbod, Bagheri, Ebrahim, Lu, Wei and Ali A. Gorbani (2009), “A Detailed Analysis of the KDD CUP 99 Dataset”, In Computational Intelligence for Security and Defense Applications, 2009. CISDA 2009, IEEE, pp. 1-6
[17] Revathi, S. and Malathi, A. (2013), “A Detailed Analysis on NSL-KDD Dataset Using Various Machine Learning Techniques for Intrusion Detection”, IJERT, 2013, Vol. 2 Issue 12.
[18] P.S. Bhattacharjee, S. A. Begum, and Md, Fujail Abul Kashim (2017), “A Comparison of Intrusion Detection by K-Means and Fuzzy C-Means Clustering Algorithm over the NSL-KDD Dataset”, IEEE-ICCIC 2017
[19] Cang, Shuang (2011), “A Mutual Information based Feature Selection Algorithm”, 4th International Conference on Biomedical Engineering and Informatics (BMEI), IEEE, pp. 2241-2245
[20] Ren Wuling, Cao, Jinzhu and Wu, Xianjie (2009), “Application of Network Intrusion Detection Based on Fuzzy C-Means Clustering Algorithm”, In Intelligent Information Technology Application IITA 2009, Third International Symposium , IEEE,Vol. 3, pp. 19-22