Skip to main content

PDA-CS: Profile Distance Assessment-Centric Cuckoo Search for Anomaly-Based Intrusion Detection in High-Speed Networks

  • Conference paper
  • First Online:
Book cover Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications

Abstract

The act of network intrusion detection is an obligatory part of network performance under security. Unlike other network security strategies, the act of intrusion detection systems should aware the behavior of the users and signature of the intruded and normal transactions, which is continuous process since the user behavior is not static as well the attack strategies are redefining in magnified speed. Hence, the objective of effective intrusion detection is always a significant factor for research. The bioinspired evolutionary strategies are getting the attention of most of the recent research studies. In order to this, the divergent contexts such as minimal computational complexity, prediction accuracy, ensemble models have been considered as significant objective. The other most significant objective and compatible to current state of art is IDS scalability and robustness in high-speed networks, hence the evolutionary computation approaches are adoptable. In this study, we propose an intrusion detection approach that is based on evolutionary computation technique called Cuckoo search. Further, the proposed detection system is investigated thoroughly in the context of accuracy, robustness, and also from the evolutionary computation point of view.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. D.S Bauer, M. K. (1988). NIDX- an expert system for real-time network intrusion detection. Proceedings of the Computer Networking Symposium, 98–106.

    Google Scholar 

  2. Mell, R. B. (2001). Intrusion Detection Systems. NIST Special Publication on Intrusion Detection System.

    Google Scholar 

  3. A. Sundaram. (1996). An introduction to intrusion detection. The ACM student magazine.

    Google Scholar 

  4. Denning, D. (1986). An intrusion-detection model. In IEEE computer society symposium on research in security and privacy, 118–131.

    Google Scholar 

  5. T.Lane. (2000). Machine Learning techniques for the computer Security. Purdue University.

    Google Scholar 

  6. Stolfo, W. L. (1998). Data mining approaches for intrusion detection. Proc. of the 7th USENIX security symposium.

    Google Scholar 

  7. W. H. Chen, S. H. (2005). Application of SVM and ANN for intrusion detection. Comput Oper Res Vol-ume 32, Issue 10, 2617–2634.

    Google Scholar 

  8. Kennedy, J. (2010). Particle swarm optimization. Encyclopedia of Machine Learning, 760–766.

    Google Scholar 

  9. Katar, C. (2006). Combining multiple techniques for intrusion detection. Int J Comput Sci Network Security, 208–218.

    Google Scholar 

  10. Chen Y, A. A. (2005). Feature deduction and intrusion detection using flexible neural trees. Second IEEE International Symposium on Neural Networks, 2617–2634.

    Google Scholar 

  11. A. Abraham, R. J. (2007). D-scids: distributed soft computing intrusion detection system. J Network Computer, 81–98.

    Google Scholar 

  12. Hassan, M. M. (2013). Current studies on intrusion detection system, genetic algorithm and fuzzy logic. International Journal of Distributed and Parallel Systems, 35–48. Retrieved from arXiv.

    Google Scholar 

  13. Sindhu, S. S. (2012). Decision tree based light weight intrusion detection using a wrapper approach. Expert Systems with applications, 129–141.

    Google Scholar 

  14. Li, Y. X. (2012). An efficient intrusion detection system based on support vector machines and gradually feature removal method. Expert Systems with Applications, 424–430.

    Google Scholar 

  15. Bhatti, D. G. (2012). Conceptual Framework for Soft Computing based Intrusion Detection to Reduce False Positive Rate. International Journal of Computer Applications, 1–3.

    Google Scholar 

  16. ISCX, U. (2012). UNB ISCX Intrusion Detection Evaluation DataSet. Retrieved from Information Security Centre of Excellence: http://www.unb.ca/research/iscx/dataset/iscx-IDS-dataset.html.

  17. Brunswick, U. o. (n.d.). Information Security Centre of Excellence. Retrieved from University of new Brunswick: http://www.unb.ca/research/iscx/index.html.

  18. Goodman, N. R. (1963). Statistical analysis based on a certain multivariate complex Gaussian distribution. Annals of mathematical statistics, 152–177.

    Google Scholar 

  19. Leys, C. L. (2013). Detecting outliers: do not use standard deviation around the mean, use absolute deviation around the median. Journal of Experimental Social Psychology, 764–766.

    Google Scholar 

  20. Powers, D. M. (2006). Evaluation: from precision, recall and F-measure to ROC, informedness, markedness and correlation. 23rd International conference on machine learning. Pitsburg.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kanaka Raju Gariga .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Gariga, K.R., Reddy, A.R.M., Rao, N.S. (2017). PDA-CS: Profile Distance Assessment-Centric Cuckoo Search for Anomaly-Based Intrusion Detection in High-Speed Networks. In: Satapathy, S., Bhateja, V., Udgata, S., Pattnaik, P. (eds) Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications . Advances in Intelligent Systems and Computing, vol 515. Springer, Singapore. https://doi.org/10.1007/978-981-10-3153-3_17

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3153-3_17

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3152-6

  • Online ISBN: 978-981-10-3153-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics