Network Intrusion Detection Using Hybrid Simplified Swarm Optimization Technique
Journal Title: International Journal of P2P Network Trends and Technology(IJPTT) - Year 2013, Vol 3, Issue 8
Abstract
Network security risks grow tremendously in recent past, the attacks on computer networks have enhanced hugely and need economical network intrusion detection mechanisms. Data processing and machine-learning techniques are used for network intrusion detection throughout the past few years and have gained abundant quality. In this paper, we propose an intrusion detection mechanism based on simplified particle swarm optimization (SSO) is used to investigate the performance of various dimension reduction techniques along with a set of different classifiers including the proposed approach. SSO is used to find more appropriate set of attributes for classifying network intrusions, and also used as a classifier. In preprocessing step, we reduce the dimensions of the dataset by using various dimension reduction techniques, and then this reduced dataset is offered to the proposed hybrid SSO approach that further optimizes the dimensions of the data and finds an optimal set of features. SSO is an optimization method that has a strong global search capability and is used for dimension optimization. The analysis performed on standard KDD cup99 dataset which contain various kind of intrusion. The experimental results shows the worth of the proposed approach by using different performance metrics.
Authors and Affiliations
S. Revathi1 , A. Malathi
Protected Data Forwarding by Erasure Coding to Cloud Storage System
Present so many mobile services are converting to cloud depended mobile services with highly communications and higher flexibility. We explore a unique mobile cloud infrastructure that attaches mobiles and cloud services...
Energy Efficient Scheme for Improving the Performance of Wireless Sensor Networks
The wireless sensor networks sensing the neighbor nodes to disseminated the information to every sensor nodes on the networks area. The random walk through topology is mentioning in this paper for obtaining the results o...
Secure Efficient Geographic Multicast Protocol For Mobile AdHoc Networks
A mobile ad-hoc network (MANET) is composed of mobile nodes without any infrastructure. So that Ad hoc networks are mainly used in emergency situations where no infrastructure is available, for e.g. military battle...
Consistency Maintenance in Fractious P2P System
Truncate dispose-to-identically to cagoule networks are out of doors worn in come unattended alongside systems. P2P networks bed basically be dispassionate into match roughly types: combine is neat the twin-to-co...
A Survey on Sensor Cloud: Architecture and Applications
Cloud Computing is a part of computer science and it enables providing Internet services to external customers via very scalable computing capacities. It is abstracted, controlled and high-scalable computer infrastructur...