An Intrusion Detection Method Based on Shuffle Frog Leaping Algorithm

Article Preview

Abstract:

This paper presents an intrusion detection model based on shuffled frog leaping algorithm, the model search speed, high accuracy based on shuffled frog leaping algorithm, using the shuffled frog leaping algorithm generates a set of classification rules from the KDD99 data network audit data collection, quality and the use of objective function shuffled frog leaping algorithm to control the production rule, and then application of the rule of dynamically generated to rule based intrusion detection system, achieve the purpose of detection. The experimental results show that, this method of detection rules generation based on shuffled frog leaping algorithm, can significantly improve quality of generation rules, reduce the rules of intrusion detection system based on the false negative rate.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 1030-1032)

Pages:

1646-1649

Citation:

Online since:

September 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Aickelin U, Greensmith J, Twycross J. Immune System Approaches to Intrusion Detection-A Review (ICARIS)[J]. arXiv preprint arXiv: 1305. 7144, (2013).

DOI: 10.2139/ssrn.2832021

Google Scholar

[2] Leith H M, Piper J W. Identification and application of security measures for petrochemical industrial control systems[J]. Journal of Loss Prevention in the Process Industries, 2013, 26(6): 982-993.

DOI: 10.1016/j.jlp.2013.10.009

Google Scholar

[3] Steenbruggen J, Borzacchiello M T, Nijkamp P, et al. Data from telecommunication networks for incident management: An exploratory review on transport safety and security[J]. Transport Policy, 2013, 28: 86-102.

DOI: 10.1016/j.tranpol.2012.08.006

Google Scholar

[4] Shamshirband S, Anuar N B, Kiah M L M, et al. An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique[J]. Engineering Applications of Artificial Intelligence, 2013, 26(9): 2105-2127.

DOI: 10.1016/j.engappai.2013.04.010

Google Scholar

[5] Horng M H. Multilevel image threshold selection based on the shuffled frog-leaping algorithm[J]. Journal of Chemical and Pharmaceutical Research, 2013, 5(9): 599-605.

Google Scholar

[6] Roy P, Roy P, Chakrabarti A. Modified shuffled frog leaping algorithm with genetic algorithm crossover for solving economic load dispatch problem with valve-point effect[J]. Applied Soft Computing, 2013, 13(11): 4244-4252.

DOI: 10.1016/j.asoc.2013.07.006

Google Scholar

[7] Hu W, Gao J, Wang Y, et al. Online adaboost-based parameterized methods for dynamic distributed network intrusion detection[J]. Cybernetics, IEEE Transactions on, 2014, 44(1): 66-82.

DOI: 10.1109/tcyb.2013.2247592

Google Scholar