A comparative analysis of different soft computing techniques for intrusion detection system

Josy Elsa Varghese, Balachandra Muniyal

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this internet era, the data are flooded with malicious activities. The role of soft computing techniques to classify highly vulnerable, complex and uncertain network data by devising an intrusion detection system is so significant. The proposed work emphasizes on the classification of normal and anomaly packets in the networks by carrying out the comparative performance evaluation of different soft computing tools including Genetic Programming (GP), Fuzzy logic, Artificial neural network (ANN) and Probabilistic model with Clustering methods using NSL-KDD dataset. Here, Fuzzy logic runs the first place in the performance metrics and the clustering algorithms and Genetic programming deliver the worst performances. Fuzzy Unordered Rule Induction Algorithm (FURIA) in Fuzzy logic gives a high detection rate of accuracy (99.69%) with the low rate of false alarms (0.31%). The computational time of FURIA (78.14 s) is not so expectant. So Fuzzy Rough Nearest Neighbor(FRNN) is recommended as an optimistic model with a sensible accuracy rate of 99.51% and tolerable false alarm rate of 0.49% along with a pretty good computational time of 0.33 s.

Original languageEnglish
Title of host publicationSecurity in Computing and Communications - 6th International Symposium, SSCC 2018, Revised Selected Papers
EditorsSabu M. Thampi, Danda B. Rawat, Jose M. Alcaraz Calero, Sanjay Madria, Guojun Wang
PublisherSpringer Verlag
Pages563-577
Number of pages15
ISBN (Print)9789811358258
DOIs
Publication statusPublished - 01-01-2019
Event6th International Symposium on Security in Computing and Communications, SSCC 2018 - Bangalore, India
Duration: 19-09-201822-09-2018

Publication series

NameCommunications in Computer and Information Science
Volume969
ISSN (Print)1865-0929

Conference

Conference6th International Symposium on Security in Computing and Communications, SSCC 2018
CountryIndia
CityBangalore
Period19-09-1822-09-18

Fingerprint

Soft computing
Soft Computing
Intrusion detection
Intrusion Detection
Comparative Analysis
Fuzzy Logic
Fuzzy logic
Rule Induction
Unordered
Genetic programming
Fuzzy rules
Genetic Programming
False Alarm Rate
False Alarm
Performance Metrics
Clustering Methods
Clustering algorithms
Neural Network Model
Probabilistic Model
Rough

All Science Journal Classification (ASJC) codes

  • Computer Science(all)
  • Mathematics(all)

Cite this

Varghese, J. E., & Muniyal, B. (2019). A comparative analysis of different soft computing techniques for intrusion detection system. In S. M. Thampi, D. B. Rawat, J. M. Alcaraz Calero, S. Madria, & G. Wang (Eds.), Security in Computing and Communications - 6th International Symposium, SSCC 2018, Revised Selected Papers (pp. 563-577). (Communications in Computer and Information Science; Vol. 969). Springer Verlag. https://doi.org/10.1007/978-981-13-5826-5_44
Varghese, Josy Elsa ; Muniyal, Balachandra. / A comparative analysis of different soft computing techniques for intrusion detection system. Security in Computing and Communications - 6th International Symposium, SSCC 2018, Revised Selected Papers. editor / Sabu M. Thampi ; Danda B. Rawat ; Jose M. Alcaraz Calero ; Sanjay Madria ; Guojun Wang. Springer Verlag, 2019. pp. 563-577 (Communications in Computer and Information Science).
@inproceedings{f0a93dd21ac4420d9c412458141f91f7,
title = "A comparative analysis of different soft computing techniques for intrusion detection system",
abstract = "In this internet era, the data are flooded with malicious activities. The role of soft computing techniques to classify highly vulnerable, complex and uncertain network data by devising an intrusion detection system is so significant. The proposed work emphasizes on the classification of normal and anomaly packets in the networks by carrying out the comparative performance evaluation of different soft computing tools including Genetic Programming (GP), Fuzzy logic, Artificial neural network (ANN) and Probabilistic model with Clustering methods using NSL-KDD dataset. Here, Fuzzy logic runs the first place in the performance metrics and the clustering algorithms and Genetic programming deliver the worst performances. Fuzzy Unordered Rule Induction Algorithm (FURIA) in Fuzzy logic gives a high detection rate of accuracy (99.69{\%}) with the low rate of false alarms (0.31{\%}). The computational time of FURIA (78.14 s) is not so expectant. So Fuzzy Rough Nearest Neighbor(FRNN) is recommended as an optimistic model with a sensible accuracy rate of 99.51{\%} and tolerable false alarm rate of 0.49{\%} along with a pretty good computational time of 0.33 s.",
author = "Varghese, {Josy Elsa} and Balachandra Muniyal",
year = "2019",
month = "1",
day = "1",
doi = "10.1007/978-981-13-5826-5_44",
language = "English",
isbn = "9789811358258",
series = "Communications in Computer and Information Science",
publisher = "Springer Verlag",
pages = "563--577",
editor = "Thampi, {Sabu M.} and Rawat, {Danda B.} and {Alcaraz Calero}, {Jose M.} and Sanjay Madria and Guojun Wang",
booktitle = "Security in Computing and Communications - 6th International Symposium, SSCC 2018, Revised Selected Papers",
address = "Germany",

}

Varghese, JE & Muniyal, B 2019, A comparative analysis of different soft computing techniques for intrusion detection system. in SM Thampi, DB Rawat, JM Alcaraz Calero, S Madria & G Wang (eds), Security in Computing and Communications - 6th International Symposium, SSCC 2018, Revised Selected Papers. Communications in Computer and Information Science, vol. 969, Springer Verlag, pp. 563-577, 6th International Symposium on Security in Computing and Communications, SSCC 2018, Bangalore, India, 19-09-18. https://doi.org/10.1007/978-981-13-5826-5_44

A comparative analysis of different soft computing techniques for intrusion detection system. / Varghese, Josy Elsa; Muniyal, Balachandra.

Security in Computing and Communications - 6th International Symposium, SSCC 2018, Revised Selected Papers. ed. / Sabu M. Thampi; Danda B. Rawat; Jose M. Alcaraz Calero; Sanjay Madria; Guojun Wang. Springer Verlag, 2019. p. 563-577 (Communications in Computer and Information Science; Vol. 969).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - A comparative analysis of different soft computing techniques for intrusion detection system

AU - Varghese, Josy Elsa

AU - Muniyal, Balachandra

PY - 2019/1/1

Y1 - 2019/1/1

N2 - In this internet era, the data are flooded with malicious activities. The role of soft computing techniques to classify highly vulnerable, complex and uncertain network data by devising an intrusion detection system is so significant. The proposed work emphasizes on the classification of normal and anomaly packets in the networks by carrying out the comparative performance evaluation of different soft computing tools including Genetic Programming (GP), Fuzzy logic, Artificial neural network (ANN) and Probabilistic model with Clustering methods using NSL-KDD dataset. Here, Fuzzy logic runs the first place in the performance metrics and the clustering algorithms and Genetic programming deliver the worst performances. Fuzzy Unordered Rule Induction Algorithm (FURIA) in Fuzzy logic gives a high detection rate of accuracy (99.69%) with the low rate of false alarms (0.31%). The computational time of FURIA (78.14 s) is not so expectant. So Fuzzy Rough Nearest Neighbor(FRNN) is recommended as an optimistic model with a sensible accuracy rate of 99.51% and tolerable false alarm rate of 0.49% along with a pretty good computational time of 0.33 s.

AB - In this internet era, the data are flooded with malicious activities. The role of soft computing techniques to classify highly vulnerable, complex and uncertain network data by devising an intrusion detection system is so significant. The proposed work emphasizes on the classification of normal and anomaly packets in the networks by carrying out the comparative performance evaluation of different soft computing tools including Genetic Programming (GP), Fuzzy logic, Artificial neural network (ANN) and Probabilistic model with Clustering methods using NSL-KDD dataset. Here, Fuzzy logic runs the first place in the performance metrics and the clustering algorithms and Genetic programming deliver the worst performances. Fuzzy Unordered Rule Induction Algorithm (FURIA) in Fuzzy logic gives a high detection rate of accuracy (99.69%) with the low rate of false alarms (0.31%). The computational time of FURIA (78.14 s) is not so expectant. So Fuzzy Rough Nearest Neighbor(FRNN) is recommended as an optimistic model with a sensible accuracy rate of 99.51% and tolerable false alarm rate of 0.49% along with a pretty good computational time of 0.33 s.

UR - http://www.scopus.com/inward/record.url?scp=85061162719&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85061162719&partnerID=8YFLogxK

U2 - 10.1007/978-981-13-5826-5_44

DO - 10.1007/978-981-13-5826-5_44

M3 - Conference contribution

SN - 9789811358258

T3 - Communications in Computer and Information Science

SP - 563

EP - 577

BT - Security in Computing and Communications - 6th International Symposium, SSCC 2018, Revised Selected Papers

A2 - Thampi, Sabu M.

A2 - Rawat, Danda B.

A2 - Alcaraz Calero, Jose M.

A2 - Madria, Sanjay

A2 - Wang, Guojun

PB - Springer Verlag

ER -

Varghese JE, Muniyal B. A comparative analysis of different soft computing techniques for intrusion detection system. In Thampi SM, Rawat DB, Alcaraz Calero JM, Madria S, Wang G, editors, Security in Computing and Communications - 6th International Symposium, SSCC 2018, Revised Selected Papers. Springer Verlag. 2019. p. 563-577. (Communications in Computer and Information Science). https://doi.org/10.1007/978-981-13-5826-5_44