A comparative analysis of different soft computing techniques for intrusion detection system

Josy Elsa Varghese, Balachandra Muniyal

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

In this internet era, the data are flooded with malicious activities. The role of soft computing techniques to classify highly vulnerable, complex and uncertain network data by devising an intrusion detection system is so significant. The proposed work emphasizes on the classification of normal and anomaly packets in the networks by carrying out the comparative performance evaluation of different soft computing tools including Genetic Programming (GP), Fuzzy logic, Artificial neural network (ANN) and Probabilistic model with Clustering methods using NSL-KDD dataset. Here, Fuzzy logic runs the first place in the performance metrics and the clustering algorithms and Genetic programming deliver the worst performances. Fuzzy Unordered Rule Induction Algorithm (FURIA) in Fuzzy logic gives a high detection rate of accuracy (99.69%) with the low rate of false alarms (0.31%). The computational time of FURIA (78.14 s) is not so expectant. So Fuzzy Rough Nearest Neighbor(FRNN) is recommended as an optimistic model with a sensible accuracy rate of 99.51% and tolerable false alarm rate of 0.49% along with a pretty good computational time of 0.33 s.

Original languageEnglish
Title of host publicationSecurity in Computing and Communications - 6th International Symposium, SSCC 2018, Revised Selected Papers
EditorsSabu M. Thampi, Danda B. Rawat, Jose M. Alcaraz Calero, Sanjay Madria, Guojun Wang
PublisherSpringer Verlag
Pages563-577
Number of pages15
ISBN (Print)9789811358258
DOIs
Publication statusPublished - 01-01-2019
Event6th International Symposium on Security in Computing and Communications, SSCC 2018 - Bangalore, India
Duration: 19-09-201822-09-2018

Publication series

NameCommunications in Computer and Information Science
Volume969
ISSN (Print)1865-0929

Conference

Conference6th International Symposium on Security in Computing and Communications, SSCC 2018
CountryIndia
CityBangalore
Period19-09-1822-09-18

All Science Journal Classification (ASJC) codes

  • Computer Science(all)
  • Mathematics(all)

Fingerprint Dive into the research topics of 'A comparative analysis of different soft computing techniques for intrusion detection system'. Together they form a unique fingerprint.

  • Cite this

    Varghese, J. E., & Muniyal, B. (2019). A comparative analysis of different soft computing techniques for intrusion detection system. In S. M. Thampi, D. B. Rawat, J. M. Alcaraz Calero, S. Madria, & G. Wang (Eds.), Security in Computing and Communications - 6th International Symposium, SSCC 2018, Revised Selected Papers (pp. 563-577). (Communications in Computer and Information Science; Vol. 969). Springer Verlag. https://doi.org/10.1007/978-981-13-5826-5_44