Reference Hub2
Anomaly Intrusion Detection Using SVM and C4.5 Classification With an Improved Particle Swarm Optimization (I-PSO)

Anomaly Intrusion Detection Using SVM and C4.5 Classification With an Improved Particle Swarm Optimization (I-PSO)

V. Sandeep, Saravanan Kondappan, Amir Anton Jone, Raj Barath S.
Copyright: © 2021 |Volume: 15 |Issue: 2 |Pages: 18
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781799859871|DOI: 10.4018/IJISP.2021040106
Cite Article Cite Article

MLA

Sandeep, V., et al. "Anomaly Intrusion Detection Using SVM and C4.5 Classification With an Improved Particle Swarm Optimization (I-PSO)." IJISP vol.15, no.2 2021: pp.113-130. http://doi.org/10.4018/IJISP.2021040106

APA

Sandeep, V., Kondappan, S., Jone, A. A., & Raj Barath S. (2021). Anomaly Intrusion Detection Using SVM and C4.5 Classification With an Improved Particle Swarm Optimization (I-PSO). International Journal of Information Security and Privacy (IJISP), 15(2), 113-130. http://doi.org/10.4018/IJISP.2021040106

Chicago

Sandeep, V., et al. "Anomaly Intrusion Detection Using SVM and C4.5 Classification With an Improved Particle Swarm Optimization (I-PSO)," International Journal of Information Security and Privacy (IJISP) 15, no.2: 113-130. http://doi.org/10.4018/IJISP.2021040106

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

In the last decade, many researchers have proposed several models of classification algorithms for enhancing the accuracy performance of IDSs. However, there is a minor issue arising in the classifier's incapability to process high-dimensional data. Using several classifiers always outperforms a single classifier's performance. This paper proposes a novel intrusion detection system by classifying data with SVM as well as C4.5 decision tree algorithm. The NSL-KDD dataset is first preprocessed with principal component analysis (PCA) and later feature selected with an improved particle swarm optimization (I-PSO). This framework improved the time consumption and inaccurate feature selection issues in other methodologies. Upon simplifying features more effectively, the outcomes display an excellent agreement with the conventional PSO techniques and their results, and also produce enhanced outcomes when compared to only single classifier. The results demonstrate better performance when subject to different attack-scenarios and can be used for enterprise network security applications.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.