A Review on Soft Computing Technique in Intrusion Detection System

Intrusion Detection System is significant in network security. It detects and identifies intrusion behavior or intrusion attempts in a computer system by monitoring and analyzing the network packets in real time. In the recent year, intelligent algorithms applied in the intrusion detection system (IDS) have been an increasing concern with the rapid growth of the network security. IDS data deals with a huge amount of data which contains irrelevant and redundant features causing slow training and testing process, higher resource consumption as well as poor detection rate. Since the amount of audit data that an IDS needs to examine is very large even for a small network, classification by hand is impossible. Hence, the primary objective of this review is to review the techniques prior to classification process suit to IDS data.




References:
[1] Dasarathy, B.V. (2003). Intrusion detection. Information Fusion, 4,
pp.243-245.
[2] Ye, Q., Wu X.P. a*, Liu Y.Q. b*, Huang, G.F. c*. (2010). A Hybrid
Model of RST and DST with Its Application in Intrusion Detection.
Depart. of Information security, Naval University of Engineering a,c*,
Naval Institute of Compute Technology, Beijing, China b*.
[3] Bishop, M. (2003). Computer security e art and science: Addison
Wesley
[4] Sung, A.H., Mukkamala, S. (2003). Identifying important features for
intrusion detection using support vector machines and neural networks.
Proceedings of International Symposium on Applications and the
Internet (SAINT 2003), p. 209e17.
[5] WenJie, T., JiCheng, L. (2009). Intrusion Detection Quantitative
Analysis with Support Vector Regression and Particle Swarm
Optimization Algorithm. Beijing Union University, Beijing, China
[6] Chen, L., Shi, L., Jiang, Q., & Wang, S. (1983-1992). Supervised
Feature Selection for Dos Detection Problems Using a New Clustering
Criterion. Journal of Computational Information Systems, 3(5)
[7] Shi-Jinn, H., a,b,*, Ming-Yang, S., c*, Yuan-Hsin, C., b*, Tzong-Wann,
K., d*, Rong-Jian, C., b*, Jui-Lin, L., b*, Citra Dwi P., a*, (2011). A
novel intrusion detection system based on hierarchical clustering and
support vector machines.
a Department of Computer Science and Information Engineering,
National Taiwan University of Science and Technology, Taipei, Taiwan
b Department of Electronic Engineering, National United University,
Miaoli, Taiwan, c Department of Computer Science and Information
Engineering, Ming Chuan University, Taoyuan, Taiwan d Department of
Electronic Engineering, Northern Taiwan Institute of Science and
Technology, Taipei, Taiwan.
[8] Ling, Y.,Bo, C., Junmo, X. (2007). An Integrated System of Intrusion
Detection Based on Rough Set and Wavelet Neural Network. Nanjing,
China
[9] Koller, D., & Sahami, M. (1996). Toward optimal feature selection.
Proceedings of the International Conference on Machine Learning.
[10] Xiang, C., Bing-Xiang, L., & Yi-Lai, Z. (2010). Attribute Reduction
Method Applied to IDS. Information engineering Institute, Jingdezhen
Ceramic Institute.
[11] Fanping, Z., Kaitao, Y., Minghui, C., & Xufa, W. (2009). A New
Anomaly Detection Method Based on Rough Set Reduction and HMM.
University of Science and Technology of China, Anhui, China
[12] Mukherjee, B., Heberlein, L.T., & Levitt, K.N. (1994, May). Network
intrusion detection. IEEE Network, (3):pp 26-41
[13] Susan, C.L., & David V.H. (2001). Training a neural-network based
intrusion detector to recognize novel attacks. IEEE Transactions on
systems, man and cybernetics-part a: System and Humans, Vol 31 No4,
pp294-299
[14] Debar, H., Becke, M., & Siboni, D. (1992). A neural network
component for an intrusion detection system. Proceedings of the IEEE
Computer Society Symposium on Research in Security and Privacy.
[15] Manganaris. (2000). A data mining analysis of RTID alarms. Computer
Networks, Vol 34, No 4 pp571-577.
[16] Tran, Q., Zhang, Q.L., & Li, X. (2002). SVM classification-based
intrusion detection system. Journal of China Institute of
Communications, Vol 23, No.5.
[17] Warrender, C., Forrest, S., & Pealmutt, B. (1999). Detecting intrusion
using system calls: alternative data mode. IEEE Symposium on Security
and Privacy.
[18] Hofmeyr, S.A., Forrest, S., & Somayaji, A. (1998). Intrusion detection
using sequences of system calls. Journal of Computer Security, Vol. 6,
pp 151-180.
[19] Asaka, M., Onabuta, T., Inoue, T., Okazawa, S., & Goto, S. (2001). A
New Intrusion Detection Method Based on Discriminant Analysis.
IEICE Transactions on Information and Systems, pp 570-577, 5.
[20] Beynon, M. J., Curry, & B., Morgan, P.H. (2000). Classification and
Rule Induction Using Rough Set Theory. Expert Systems, Vol 17, NO 3,
pp 136-148
[21] Forrest, S., Ofmeyr, S.A., Somayaji, A. (1996). A Sense of Self for Unix
Processes. IEEE Computer Society, In Proceedings of 1996 IEEE
Symposium on ComputerSecurity and Privacy, New York, pp120-128
[22] Jian, L., Zhang G., Gu G. (2004). The research and implementation of
intelligent intrusion detection system based on artificial neural network.
The 3rd International Conference on Machine Learning and Cybernetics,
Shanghai.
[23] Hofmann, A., Schmitz, C., & Sick, B. (2003). Rule extraction from
neural networks for intrusion detection in computer networks systems.
IEEE Transactions on system, Man and Cybernetics, IEEE Inc,CA,
pp.1259-1265.
[24] Golovko, & V., Kochurko, P. (2005, September). Intrusion Recognition
Using Neural Networks. IEEE Workshop on Intelligent Data Acquisition
and Advanced Computing Systems: Technology and Applications, Sofia,
Bulgaria, pp.108-111.
[25] Sung, A.H., & Mukkamala, S. (2003). Identifying Important Features for
Intrusion Detection using Vector Machines and Neural Networks.
Proceedings of International Symposium on applications and the
Internet Technology, pp. 209-216
[26] Shazzad, K.M., & Jong S. P. (2005, Dec). Optimization of Intrusion
Detection through Fast Hybrid Feature Selection. Parallel and
Distributed Computing, Applications and Technologies, PDCAT 2005.
Sixth International Conferenc, pp. 264-267.
[27] Luyin, C., Qingshan J., Lifei, C. (2008). A Feature Selection Method for
Network Intrusion Detection. Computer Research and Development
Supplement, 45(10):156-160.
[28] Vapnik, V. (1995). The Nature of Statistical Learning Theory. Springer-
Verlag Press, New York , American
[29] Cortes, C., & Vapnik, V. (1995). Support vector networks. Machine
Learning, Vol.20, No.3, 273-297
[30] Hansung, L., Jiyoung, S., & Daihee, Park. (2005). Intrusion Detection
System Based on Multi-class SVM. Lecture Notes in Computer Science,
vol.3642, Springer Berlin, 9, pp.511-519.
[31] Mukkamala, S., Janoski, G., Sung, A.H. (2002). Intrusion Detection
Using Neural Networks and Support Vector Machines. Proceedings of
IEEE International Joint Conference on Neural Networks, Vol 2,
Honolulu, 5, pp. 1702-1707.
[32] Dong, S. K., Ha, N.N., Jong, S.P. (2005). Genetic algorithm to improve
SVM based network intrusion detection system. 19th International
Conference on Advanced Information Networking and Applications,
Vol.2, Taiwan, 3, pp.155-158.
[33] Ambwani, T. (2003). Multi class Support Vector Machine
Implementation to Intrusion Detection. Proc. IEEE International Joint
Conference on Neural Networks, pp.2300-2305
[34] Mukkamala, S., Sung A.H., & Abraham, A. (2005). Intrusion detection
using an ensemble of intelligent paradigms. Journal of Network and
Computer Applications, vol.28, pp. 167-182
[35] Shi, Y., & Eberhart, R. (1998). A Modified Particle Swarm Optimizer.
IEEE World Congress on Computation Intelligence, pp.69-73.
[36] De Castro, L., & Von Zuben, F. (2002). Learning and Optimization
Using the Clonal selection principle. IEEE Transactions on Evolutionary
Computation, Vol. 6(3), pp. 239-251.
[37] Forrest, S., Perrelason, A.S., Allen, L., & Cherukur, R. (1994). Self-
Nonself discrimination in a computer. Proceedings of the 1994 IEEE
Symposium on Research in Security and Privacy, Oakland, CA:IEEE
Computer Society Press, pp.202-212.
[38] Lee, W., & Stolfo, S.J. (1999). A data mining framework for building
intrusion detection model. Proceedings of the 1999 IEEE Symposium on
Security and Privacy.Oakland, CA:IEEE Computer Society Press,
pp.120-132.
[39] Mukkamala, R.K., Gagnon, J., & Jajodia, S. (2000). Integrated data
mining techniques with intrusion detection. Research Advances in
Database and Information Systems Security. Kluwer Publisher, pp. 33-
46.
[40] Lee, W., & Stolfo, S.J. A framework for constructing features and
models for intrusion detection systems. ACM Trans .Inform. Syst.
Security , vol.3, pp. 227-261.
[41] Dash, M., Liu, H., & Motoda, H. (2000). Consistency based feature
selection. Proc. of the Fourth PAKDD 2000, Kyoto, Japan, pp. 98-109.
[42] Almuallim, H., & Dietterich, T.G. (1994). Learning Boolean Concepts
in the Presence of Many Irrelevant Features. Artificial Intelligence, vol.
69, nos. 1-2, pp. 279-305.
[43] Shafer, G. (1976). A mathematical theory of evidence. Princeton, NJ:
Princeton University Press
[44] Ye, Q., Wu, X.P., Liu, Y.Q., Huang, G.F. ( ). A Hybrid Model of RST
and DST with Its Application in Intrusion Detection. Naval University
of Engineering, Wuhan, China
[45] Bose, I. (2006). Deciding The Financial Health Of Dot-Coms Using
Rough Sets. School of Business, University of Hong Kong.
[46] Ling, Y., Bo, C., Junmo, X. (2007). An Integrated System of Intrusion
Detection Based on Rough Set and Wavelet Neural Network. Nanjing
China.
[47] Liang, S.Y., Yuteng, G., Beizhan, W., Xinxing, Z., Xiaobiao, X., Lida,
L., & Qingda, Z. (2010). Feature Selection Based on Rough Set and
Modified Genetic Algorithm for Intrusion Detection. The Research of
Complex-Intrusion-oriented Alert Information Aggregation and
Association Analysis Technology (NO.2008F3101)" A.P. Software
School of Xiamen University, Xiamen, China
[48] Cortes, C., & Vapnik, V. (1995). Support Vector Networks. Machine
learning, vol.20, no.3, Springer Berlin, pp.273-297.
[49] Burges, C.J.C. (1998). A tutorial on support vector machines for pattern
recognition. Data Mining and Knowledge Discovery, vol 2(2), Springer
US, pp.121-167.
[50] Steve, R.G. (1998). Support Vector Machines for Classification and
Regression. Technical Report, University of Southampton Press,
Southampton, UK
[51] Mukkamala, S., Janoski, G., Sung, A.H. (2002). Intrusion Detection
Using Neural Networks and Support Vector Machines. Proceedings of
IEEE International Joint Conference on Neural Networks, Vol 2,
Honolulu, 5, pp. 1702-1707.
[51] Huaping, L., Yin, J., & Sijia, L. (2010). A New Intelligent Intrusion
Detection Method Based on Attribute Reduction and Parameters
Optimization of SVM. Xihua University, Chengdu, China.
[52] Takahashi, F., & Abe, S. (2003). Decision-Tree-Based Multi class
Support Vector Machines. Proc. International Conference on Neural
Information Processing, Vol.3, pp.1418-1422
[53] Zhenying, M., Lei, Z., Xiaofeng, L. (2005). On the Efficiency of
Support Vector Classifiers for intrusion detection. Chongqing, China
[54] Qingxiang, W., Jianmei, S. (2009). Fusion of Rough Set Theory and
Linear SVM for Intrusion Detection System. University of Science and
Technology of China, Hefei, China.
[55] Chih-Fong, T. a*, Yu-Feng, H. b*, Chia-Ying, L. c*, & Wei-Yang, L.
d,*. (2009). Intrusion Detection by Machine Learning: A review, a
Department of Information Management, National Central University,
Taiwan b Department of Information Management, National Sun Yat-
Sen University, Taiwan c Department of Accounting and Information
Technology, National Chung Cheng University, Taiwan d Department
of Computer Science and Information Engineering, National Chung
Cheng University, Taiwan.