Skip to main content
Log in

A Feature Reduced Intrusion Detection System with Optimized SVM Using Big Bang Big Crunch Optimization

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The swift proliferation in traffic across computer networks has led to certain types of attacks and intrusions, raising a serious global concern of information security. Attack detection is possible by monitoring and observing occurrences in intrusion detection systems, however these systems tend to suffer from problem of curse of dimensionality, high false alarm rate, high time complexity and low detections. In order to overcome these limitations, we propose a feature reduced intrusion detection system employing optimized SVM as a classifier. Feature Reduction has been performed by fusing ranked features from information gain and chi square in a way that it has helped in retaining only important features and discarding the rest. The study further proposes an optimized version of SVM classifier using Big Bang Big Crunch (BBBC) optimization that simulates the big bang and big crunch theory of evolution of universe. BBBC has helped in finding an optimal set of SVM parameters quickly that are further used for classification. We also experimented with a number of fitness functions for gauging the performance of IDS and propose a new fitness function based on the weighted F1 score of various traffic classes. KDD-99 dataset has been used for experimentation and analysis. The paper further experiments the effects of under-sampling and oversampling of various traffic classes on the proposed IDS performance and recommends that maintaining a desired ratio for a mix of under-sampling and over-sampling of desired classes produces the best results.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Availability of data and material

The data may be made available on request with permissions.

Code availability

The code may be made available on request with permissions.

References

  1. Ameeri, F., Yousefi, M. R., Lucas, C., Shakery, A., & Yazdani, N. (2011). Mutual information based feature selection for intrusion detection systems. Journal of Network Computer Applications, 34(4), 1184–1199.

    Article  Google Scholar 

  2. Vasan, K. K., & Surendiran, B. (2016). Dimensionality reduction using principal component analysis for network intrusion detection. Perspective Science, 8, 510–512.

    Article  Google Scholar 

  3. Rene Beulah, J., & Shalini Punithavathani, D. A. (2018). Hybrid feature selection method for improved detection of wired/wireless network intrusions. Wireless Personal Communications, 98, 1853–1869. https://doi.org/10.1007/s11277-017-4949-x

    Article  Google Scholar 

  4. Li, Y., Xia, J., Zhang, S., Yan, J., Ai, X., & Dai, K. (2012). An efficient intrusion detection system based on support vector machines and gradually feature removal method. Expert Systems with Applications, 39(1), 424–430.

    Article  Google Scholar 

  5. Eesa, A. S., Orman, Z., & Brifcani, A. M. A. (2015). A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems. Expert Systems with Applications, 42(5), 2670–2679.

    Article  Google Scholar 

  6. Ravale, U., Marathe, N., & Padiya, P. (2016). Feature selection based hybrid anomaly intrusion detection system using K means and RBF kernel function. Procedia Computer Science, 45, 428–435.

    Article  Google Scholar 

  7. Kuang, F., Zhang, S., Jin, Z., & Xu, W. (2015). A novel SVM by combining kernel principal component analysis and improved chaotic particle swarm optimization for intrusion detection. Soft Computing, 19(5), 1187–1199.

    Article  Google Scholar 

  8. Kunang, Y. N., Nurmaini, S., Stiawan, D., & Suprapto, B. Y. (2021). Attack classification of an intrusion detection system using deep learning and hyperparameter optimization. Journal of Information Security and Applications, 58, 102804.

    Article  Google Scholar 

  9. Li, X., Chen, W., Zhang, Q., & Wu, L. (2020). Building auto-encoder intrusion detection system based on random forest feature selection. Computers & Security. https://doi.org/10.1016/j.cose.2020.101851

    Article  Google Scholar 

  10. Manimurugan, S., Majdi, A. Q., Mohmmed, M., Narmatha, C., & Varatharajan, R. (2020). Intrusion detection in networks using crow search optimization algorithm with adaptive neuro-fuzzy inference system. Microprocessors and Microsystems, 79, 103261.

    Article  Google Scholar 

  11. Dash, N., Chakravarty, S., Satpathy, S. (2021). An improved harmony search based extreme learning machine for intrusion detection system, Materials Today: Proceedings.

  12. Alazzam, H., Sharieh, A., & Sabri, K. E. (2020). A feature selection algorithm for intrusion detection system based on Pigeon Inspired Optimizer. Expert Systems With Applications, 148, 113249.

    Article  Google Scholar 

  13. Shorman, A., Faris, H., & Aljarah, I. (2019). Unsupervised intelligent system based on one class support vector machine and grey wolf optimization for IoT botnet detection. Journal of Ambient Intelligence and Humanized Computing, 11, 2809–2825. https://doi.org/10.1007/s12652-019-01387-y

    Article  Google Scholar 

  14. Mohammadi, S., Mirvaziri, H., Ghazizadeh-Ahsaee, M., & Karimipour, H. (2019). Cyber intrusion detection by combined feature selection algorithm. Journal of Information Security and Applications, 44, 80–88.

    Article  Google Scholar 

  15. Zhou, Y., Cheng, G., Jiang, S., Da, M. (2019). An efficient network intrusion detection system based on feature selection and ensemble classifier. Computer Networks, 174, 107247. https://doi.org/10.1016/j.comnet.2020.107247.

  16. Ganeshan, R., Rodrigues, P. Crow-AFL: Crow based adaptive fractional lion optimization approach for the intrusion detection. Wireless Personal Communication 111, 2065–2089. https://doi.org/10.1007/s11277-019-06972-0

  17. Kuang, F., Xu, W., Zhang, S., Wang, Y., & Liu, K. (2012). A novel approach of KPCA and SVM for intrusion detection. Journal of Computational Information System, 8(8), 3237–3244.

    Google Scholar 

  18. Kuang, F., Xu, W., & Zhang, S. (2014). A novel hybrid KPCA and SVM with GA model for intrusion detection. Applied Soft Computing, 18, 178–184.

    Article  Google Scholar 

  19. Thaseen, I. S., & Kumar, C. A. (2017). Intrusion detection model using fusion of chi-square feature selection and multi class SVM. Journal of King Saud University Information Science, 29(4), 462–472.

    Article  Google Scholar 

  20. Acharya, N., & Singh, S. (2018). An IWD-based feature selection method for intrusion detection system. Soft Computing, 22(13), 4407–4416.

    Article  Google Scholar 

  21. Nagar, P., Menaria, H. K., Tiwari M. (2020). Novel approach of intrusion detection classification deep learning using SVM. In First International Conference on Sustainable Technologies for Computational Intelligence. Springer.

  22. Wu, Y., Lee, W. W., Xu, Z., & Ni, M. (2020). Large-scale and robust intrusion detection model combining improved deep belief network with feature-weighted SVM. IEEE Access., 8, 98600–98611. https://doi.org/10.1109/access.2020.2994947

    Article  Google Scholar 

  23. Kalita, D. J., Singh, V. P., & Kumar, V. (2020). SVM hyper-parameters Optimization using multi-PSO for intrusion detection (pp. 227–241). Springer.

    Google Scholar 

  24. Jaber, A. N., & Rehman, S. U. (2020). FCM–SVM based intrusion detection system for cloud computing environment. Cluster Computing, 23, 3221–3231.

    Article  Google Scholar 

  25. Safaldin, M., Otair, M., & Abualigah, L. (2020). Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks. Journal of Ambient Intelligence and Humanized Computing, 12, 1559–1576.

    Article  Google Scholar 

  26. Wang, S., & Yao, X. (2012). Multiclass imbalance problems: Analysis and potential solutions. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, 42(4), 1119–1130. https://doi.org/10.1109/TSMCB.2012.2187280

    Article  Google Scholar 

  27. Mikhail, J. W., Fossaceca, J. M., & Iammartino, R. (2019). A semi-boosted nested model with sensitivity-based weighted binarization for multidomain network intrusion detection. ACM Transactions on Intelligent Systems and Technology. https://doi.org/10.1145/3313778

    Article  Google Scholar 

  28. Fossaceca, J. M., Mazzuchi, T. A., & Sarkani, S. (2015). MARK-ELM: Application of a novel multiple kernel learning framework for improving the robustness of network intrusion detection. Expert Systems with Applications, 42(8), 4062–4080.

    Article  Google Scholar 

  29. Akashdeep, M. I., & Kumar, N. (2017). A feature reduced intrusion detection system using ANN classifier. Expert Systems with Applications, 88, 249–257. https://doi.org/10.1016/j.eswa.2017.07.005

    Article  Google Scholar 

  30. Trupti, C., Shukla, S., Wadhvani, R. (2019). An analysis of A feature reduced intrusion detection system using ANN classifier by Akashdeep et al. expert systems with applications (2017), Expert Systems with applications, 130, 79-83.

  31. KDD Cup 1999 Data, available at : http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. Last accessed on 21/04/2021

  32. Boser, B., Guyon, I. M, Vapnik, V. N. (1992). A training algorithm for optimal margin classifiers.In Proceedings of the fifth annual workshop on Computational learning theory – COLT '92. p. 144. CiteSeerX 10.1.1.21.3818. doi:https://doi.org/10.1145/130385.130401. ISBN 978–0897914970. S2CID 207165665.

  33. Erol, O. K., & Eksin, I. (2006). A new optimization method: Big Bang-Big Crunch. Advances in Engineering Software, 31(2), 106–111.

    Article  Google Scholar 

Download references

Funding

No funding has been received.

Author information

Authors and Affiliations

Authors

Contributions

All authors contributed towards planning, literature survey, experimentations, manuscript writing, editing and proof-reading.

Corresponding author

Correspondence to Akashdeep Sharma.

Ethics declarations

Conflict of interest

The authors declare that thy have no competing or conflicts of interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Nagpal, M., Kaushal, M. & Akashdeep Sharma A Feature Reduced Intrusion Detection System with Optimized SVM Using Big Bang Big Crunch Optimization. Wireless Pers Commun 122, 1939–1965 (2022). https://doi.org/10.1007/s11277-021-08975-2

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-08975-2

Keywords

Navigation