Abstract
‘Curse of Dimensionality’ and the trade-off between high detection rate and less false alarm rate make the design of an efficient and robust Intrusion Detection System, an open research challenge. In this way, we present Hyper Clique—Improved Binary Gravitational Search Algorithm based Support Vector Machine (HC-IBGSA SVM), an efficient and adaptive intrusion detection technique to improve the performance of SVM in terms of detection rate and false alarm rate. HC-IBGSA SVM employs hyper clique property of hypergraph, novel mutation operator, and Newton–Raphson inspired position update function to fasten the search for an optimal solution and to prevent premature convergence. Further, HC-IBGSA uses a weighted objective function to maintain the trade-off between maximizing detection rate and minimizing the false alarm rate and the optimal number of features. The experimental evaluations were carried out using two benchmark intrusion datasets, namely NSL-KDD CUP dataset and UNSW-NB15 dataset under two scenarios (1) SVM trained with all features, and (2) SVM trained with the optimal feature subset and model parameters obtained from HC-IBGSA in terms of various quality metrics, stability analysis and statistical test.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Aburomman AA, Ibne Reaz MB (2016) A novel SVM-kNN-PSO ensemble method for intrusion detection system. Appl Soft Comput J 38:360–372. https://doi.org/10.1016/j.asoc.2015.10.011
Aburomman AA, Ibne Reaz MB (2017) A novel weighted support vector machines multiclass classifier based on differential evolution for intrusion detection systems. Inf Sci (Ny) 414:225–246. https://doi.org/10.1016/j.ins.2017.06.007
Akashdeep, Manzoor I, Kumar N (2017) A feature reduced intrusion detection system using ANN classifier. Expert Syst Appl 88:249–257. https://doi.org/10.1016/j.eswa.2017.07.005
Al-Qatf M, Lasheng Y, Al-Habib MA-SK (2018) Deep learning approach combining sparse autoencoder with SVM for network intrusion detection. IEEE Access 6:52843–52856
Al-Yaseen WL, Othman ZA, Nazri MZA (2017) Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system. Expert Syst Appl 67:296–303. https://doi.org/10.1016/j.eswa.2016.09.041
Ashfaq RAR, Wang X-ZZ, Huang JZ et al (2017) Fuzziness based semi-supervised learning approach for intrusion detection system. Inf Sci (Ny) 378:484–497. https://doi.org/10.1016/j.ins.2016.04.019
Berge C, Minieka E (1973) Graphs and hypergraphs. North-Holland Pub. Co., Amsterdam
Bisson D The 10 biggest data breaches of 2018… So Far. https://blog.barkly.com/biggest-data-breaches-2018-so-far. Accessed 15 July 2019
Bretto A, Gillibert L (2005) Hypergraph-based image representation. In: International workshop on graph-based representations in pattern recognition. Springer, Berlin, pp 1–11
Bretto A, Cherifi H, Aboutajdine D (2002) Hypergraph imaging: an overview. Pattern Recognit 35(3):651–658
Byun H, Lee SW (2002) Applications of support vector machines for pattern recognition: a survey. In: Lee S-W, Verri A (eds) First international workshop, SVM 2002. Springer, Berlin, pp 213–236
Cambazoglu BB, Aykanat C (2007) Hypergraph-partitioning-based remapping models for image-space-parallel direct volume rendering of unstructured grids. IEEE Trans Parallel Distrib Syst 18:3–16. https://doi.org/10.1109/TPDS.2007.253277
Cristianini N, Shawe-Taylor J (2000) An introduction to support vector machines: and other kernel-based learning methods. Cambridge University Press, Cambridge
Davis JJ, Clark AJ (2011) Data preprocessing for anomaly based network intrusion detection: a review. Comput Secur 30:353–375. https://doi.org/10.1016/j.cose.2011.05.008
Dharmarajan R, Kannan K (2010) A hypergraph-based algorithm for image restoration from salt and pepper noise. AEU Int J Electron 64:1114–1122
Dharmarajan R, Kannan K (2012) Hypergraph-based edge detection in gray images by suppression of interior pixels. Glob J Sci Front 12:7–19
Ducournau A, Bretto A, Rital S, Laget B (2012) A reductive approach to hypergraph clustering: an application to image segmentation. Pattern Recognit 45:2788–2803
Faraoun KM, Boukelif A (2006) Genetic programming approach for multi-category pattern classification applied to network intrusions detection. Int J Comput Intell Appl 6:77–99. https://doi.org/10.1142/S1469026806001812
Farzaneh Ghorbani HN (2012) On the convergence analysis of gravitational search algorithm. J Adv Comput Res 3:45–51
Garg S, Batra S (2017) A novel ensembled technique for anomaly detection. Int J Commun Syst 30:e3248. https://doi.org/10.1002/dac.3248
Gauthama Raman MR, Kirthivasan K, Shankar Sriram VS (2017a) Development of rough set—hypergraph technique for key feature identification in intrusion detection systems. Comput Electr Eng 59:189–200. https://doi.org/10.1016/j.compeleceng.2017.01.006
Gauthama Raman MR, Nivethitha S, Kirthivasan K, Shankar Sriram VS (2017b) A hypergraph and arithmetic residue-based probabilistic neural network for classification in intrusion detection systems. Neural Netw 92:89–97
Gauthama Raman MR, Somu N, Kirthivasan K et al (2017c) An efficient intrusion detection system based on hypergraph—Genetic algorithm for parameter optimization and feature selection in support vector machine. Knowl Based Syst 134:1–12
Hall M, Frank E, Holmes G et al (2009) The WEKA data mining software. ACM SIGKDD Explor Newsl 11:10. https://doi.org/10.1145/1656274.1656278
Hosseini Bamakan SM, Wang H, Yingjie T, Shi Y (2016) An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization. Neurocomputing 199:90–102. https://doi.org/10.1016/j.neucom.2016.03.031
Hosseini Bamakan SM, Wang H, Shi Y (2017) Ramp loss K-support vector classification-regression; a robust and sparse multi-class approach to the intrusion detection problem. Knowl Based Syst 126:113–126. https://doi.org/10.1016/J.KNOSYS.2017.03.012
Huang C-L, Wang C-J (2006) A GA-based feature selection and parameters optimization for support vector machines. Expert Syst Appl 31:231–240. https://doi.org/10.1016/j.eswa.2005.09.024
Hubballi N, Suryanarayanan V (2014) False alarm minimization techniques in signature-based intrusion detection systems: a survey. Comput Commun 49:1–17. https://doi.org/10.1016/j.comcom.2014.04.012
Jiang F, Chen Y-M (2015) Outlier detection based on granular computing and rough set theory. Appl Intell 42:303–322. https://doi.org/10.1007/s10489-014-0591-4
Jiang F, Sui Y, Cao C (2013) An incremental decision tree algorithm based on rough sets and its application in intrusion detection. Artif Intell Rev 40:517–530. https://doi.org/10.1007/s10462-011-9293-z
Kabir E, Hu J, Wang H, Zhuo G (2018) A novel statistical technique for intrusion detection systems. Futur Gener Comput Syst 79:303–318. https://doi.org/10.1016/j.future.2017.01.029
Karami A (2018) An anomaly-based intrusion detection system in presence of benign outliers with visualization capabilities. Expert Syst Appl 108:36–60. https://doi.org/10.1016/j.eswa.2018.04.038
Khammassi C, Krichen S (2017) A GA-LR wrapper approach for feature selection in network intrusion detection. Comput Secur 70:255–277. https://doi.org/10.1016/j.cose.2017.06.005
Kolias C, Kambourakis G, Maragoudakis M (2011) Swarm intelligence in intrusion detection: a survey. Comput Secur 30:625–642
Kuang F, Xu W, Zhang S (2014) A novel hybrid KPCA and SVM with GA model for intrusion detection. Appl Soft Comput J 18:178–184. https://doi.org/10.1016/j.asoc.2014.01.028
Kumar G, Kumar K, Sachdeva M (2010) The use of artificial intelligence based techniques for intrusion detection: a review. Artif Intell Rev 34:369–387. https://doi.org/10.1007/s10462-010-9179-5
Liang D, Lu CJH (2017) Soft multimedia anomaly detection based on neural network and optimization driven support vector machine. Multimed Tools Appl 78:1–24
McHugh J (2000) Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Trans Inf Syst Secur 3:262–294. https://doi.org/10.1145/382912.382923
Moustafa NSJ (2016) The evaluation of network anomaly detection systems: statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set. Inf Secur J A Glob Perspect 25:18–31
Moustafa N, Slay J (2015) UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 military communications and information systems conference (MilCIS), pp 1–6
Raman MRG, Kannan K, Pal SK, Shankar Sriram VS (2016) Rough set-hypergraph-based feature selection approach for intrusion detection systems. Def Sci J 66:612–617. https://doi.org/10.14429/dsj.66.10802
Raman MRG, Nivethitha S, Kannan K, Shankar Sriram VS (2019) A hybrid approach using rough set theory and hypergraph for feature selection on high-dimensional medical datasets. Soft Comput. https://doi.org/10.1007/s00500-019-03818-6
Rashedi E, Nezamabadi-Pour H, Saryazdi S (2010) BGSA: binary gravitational search algorithm. Nat Comput 9:727–745. https://doi.org/10.1007/s11047-009-9175-3
Rashedi EE, Rashedi EE, Nezamabadi-pour H (2018) A comprehensive survey on gravitational search algorithm. Swarm Evol Comput 41:141–158. https://doi.org/10.1016/j.swevo.2018.02.018
Saleh AI, Talaat FM, Labib LM (2017) A hybrid intrusion detection system (HIDS) based on prioritized k-nearest neighbors and optimized SVM classifiers. Artif Intell Rev. https://doi.org/10.1007/s10462-017-9567-1
Salo F, Nassif ABEA (2019) Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection. Comput Netw 148:164–175
Salzberg SL (1997) On comparing classifiers: pitfalls to avoid and a recommended approach. Data Min Knowl Discov 1:317–328. https://doi.org/10.1023/A:1009752403260
Sam Cook 2017–2018 Ransomware statistics and facts. https://www.comparitech.com/antivirus/ransomware-statistics/#gref. Accessed 15 July 2019
Shah SAR, Issac B (2018) Performance comparison of intrusion detection systems and application of machine learning to Snort system. Future Gener Comput Syst 80:157–170. https://doi.org/10.1016/j.future.2017.10.016
Shams EA, Rizaner AUA (2018) Trust aware support vector machine intrusion detection and prevention system in vehicular ad hoc networks. Comput Secur 1:245–254
Shen L, Chen H, Yu Z et al (2016) Evolving support vector machines using fruit fly optimization for medical data classification. Knowl Based Syst 96:61–75. https://doi.org/10.1016/j.knosys.2016.01.002
Singh R, Kumar H, Singla RK (2015) An intrusion detection system using network traffic profiling and online sequential extreme learning machine. Expert Syst Appl 42:8609–8624. https://doi.org/10.1016/j.eswa.2015.07.015
Somu N, Raman MRG, Kirthivasan K, Sriram VSS (2016) Hypergraph based feature selection technique for medical diagnosis. J Med Syst 40:239. https://doi.org/10.1007/s10916-016-0600-8
Somu N, Kirthivasan K, Shankar SS (2017a) A computational model for ranking cloud service providers using hypergraph based techniques. Future Gener Comput Syst 68:14–30. https://doi.org/10.1016/j.future.2016.08.014
Somu N, Kirthivasan K, Sriram VSS (2017b) A rough set-based hypergraph trust measure parameter selection technique for cloud service selection. J Supercomput 73:4535–4559. https://doi.org/10.1007/s11227-017-2032-8
Somu N, Gauthama Raman MR, Kalpana V et al (2018a) An improved robust heteroscedastic probabilistic neural network based trust prediction approach for cloud service selection. Neural Netw 108:339–354. https://doi.org/10.1016/J.NEUNET.2018.08.005
Somu N, Gauthama Raman MR, Kannan K, Shankar Sriram VS (2018b) A trust centric optimal service ranking approach for cloud service selection. Future Gener Comput Syst 86:234–252. https://doi.org/10.1016/j.future.2018.04.033
Somu N, Gauthama Raman MR, Gireesha O, Krithivasan Kannan VSS (2019) An improved rough set approach for optimal trust measure parameter selection in cloud environments. Soft Comput. https://doi.org/10.1007/s00500-018-03753-y
Sumaiya Thaseen I, Aswani Kumar C (2017) Intrusion detection model using fusion of Chi square feature selection and multi class SVM. J King Saud Univ Comput Inf Sci 29:462–472. https://doi.org/10.1016/j.jksuci.2015.12.004
Tao P, Sun ZSZ (2018) An improved intrusion detection algorithm based on GA and SVM. IEEE Access 6:13624–13631
Tavallaee M, Bagheri E, Lu W (2009) A detailed analysis of the KDD CUP 99 data set. In: IEEE symposium on computational intelligence for security and defense applications, CISDA 2009, pp 1–6
Tian Y, Mirzabagheri M, Bamakan SMH et al (2018) Ramp loss one-class support vector machine; a robust and effective approach to anomaly detection problems. Neurocomputing. https://doi.org/10.1016/j.neucom.2018.05.027
Tsai C-FF, Hsu Y-FF, Lin C-YY, Lin W-YY (2009) Intrusion detection by machine learning: a review. Expert Syst Appl 36:11994–12000. https://doi.org/10.1016/j.eswa.2009.05.029
Vapnik VN (2013) The nature of statistical learning theory. Springer
Vijayanand R, Devaraj D, Kannapiran B (2018) Intrusion detection system for wireless mesh network using multiple support vector machine classifiers with genetic-algorithm-based feature selection. Comput Secur 77:304–314. https://doi.org/10.1016/j.cose.2018.04.010
Wang H, Gu J, Wang S (2017) An effective intrusion detection framework based on SVM with feature augmentation. Knowl Based Syst 136:130–139. https://doi.org/10.1016/j.knosys.2017.09.014
Wang W, Liu J, Pitsilis G, Zhang X (2018) Abstracting massive data for lightweight intrusion detection in computer networks. Inf Sci (Ny) 433–434:417–430. https://doi.org/10.1016/J.INS.2016.10.023
Yu Z, Tsai JJP, Weigert T (2008) An adaptive automatically tuning intrusion detection system. ACM Trans Autom Adapt Syst 3:1–25. https://doi.org/10.1145/1380422.1380425
Zhang A, Sun G, Ren J, Li X, Wang ZJX (2018) A dynamic neighborhood learning-based gravitational search algorithm. IEEE Trans Cybern 48:436–447
Acknowledgements
This work was supported by The Ministry of Electronics and Information Technology, India; Department of Science and Technology (SR/FST/ETI-349/2013), India; TATA Realty—SASTRA Srinivasa Ramanujan Research Cell, India (Grant No: AAA-22/7/2018-CSRD-MeitY, MRT/2017/000155, SR/FST/MSI-107/2015).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendix
Appendix
1.1 A The convergence of improved binary gravitational search algorithm
To prove the convergence of the improved binary gravitational search algorithm, the position of the agents or objects \( \left( {x_{i} } \right) \) has to the traced analytically by considering its interaction with other objects of the same generation along with its time varying parameters and random characteristics. The convergence of the IBGSS can be proven mathematically, if \( \lim_{t \to \infty } x_{i}^{t} = A, \) where A is the constant i.e. \( \lim_{t \to \infty } \left( {x_{i}^{t + 1} - x_{i}^{t} } \right) = 0 \). The convergence proof as follows (Farzaneh Ghorbani 2012).
Theorem A.1
Let us consider two real valued functions\( x^{t} \)and\( y^{t} \)such that for few values of\( N > 0, \left| {x^{t} } \right| < N \)and\( \lim_{t \to \infty } y^{t} = 0 \). Hence, we can conclude that\( \lim_{t \to \infty } x^{t} y^{t} = 0 \).
Proof
Let \( \varepsilon > 0, \) then there exist \( T > 0\left| {\forall t} \right\rangle T \quad {\text{and}}\quad \left| {y^{t} } \right| < \frac{\varepsilon }{N} \). Hence, \( \forall t > T \).
□
Theorem A.2
Let us consider\( \lim_{t \to \infty } G^{t} = 0 \), then\( \lim_{t \to \infty } \left( {x_{i}^{t + 1} - x_{i}^{t} } \right) = 0 \).□
Proof
From Eq. (6), we can state that \( (R_{ij} + \varepsilon ) > x_{j}^{t} - x_{i}^{t} \), which implies,
□
Similarly, from Eq. (4), we conclude that,
For the general case, \( M_{j}^{t} \) can be rewritten as \( \sum\nolimits_{j = 1}^{k } {M_{j}^{t} = L > 0} \)
From Eq. (A.2), we derive the following equation,
Since we consider only the \( K_{best} \) particles, Eq. (A.4) can be modified as follows,
From Eq. (A.5) and Theorem A.1, we conclude that \( \lim_{t \to \infty } a_{i}^{t} = 0 \).
Form the Eq. (8),
Applying limits for Eq. (A.6), we get,
Further rearranging Eq. (A.7), we get,
Using Eq. (A.8), we get \( { \lim }_{t \to \infty } \left( {\left( {1 - r_{i} } \right)v_{i}^{t} } \right) = 0 \).
As \( r_{i} \) is uniformly distributed in a range of [0,1], it cannot converge to 0 since it is independent of t. Hence \( { \lim }_{t \to \infty } \left( {v_{i}^{t} } \right) = 0 \).
Similarly, for case 1 in Eq. (12), i.e., \( rand > \frac{{Tanh\left( {V_{i}^{t + 1} } \right)}}{{{\text{sech}}^{2} \left( {V_{i}^{t + 1} } \right)}} \)
Applying limits on Eq. (A.9), we get,
Similarly, for case 2 in Eq. (11), i.e., \( rand > \frac{{Tanh\left( {V_{i}^{t + 1} } \right)}}{{{\text{sech}}^{2} \left( {V_{i}^{t + 1} } \right)}} \)
Applying limits on Eq. (A.11), we get,
Therefore, we can state that either \( \bar{x}_{i}^{t} \quad {\text{or}}\quad x_{i}^{t} \) is a convergent sequence and agents in IBGSA convergence to a stable point. □
1.2 B Time and computational complexity of IBGSA
In standard BGSA and IBGSA, the process that incurs computational cost are (1) Initialization \( \left( {T_{Ini} } \right) \) (2) Fitness computation \( \left( {T_{Fit} } \right) \) (3) Acceleration computation \( \left( {T_{Acc} } \right) \) (4) Velocity and position updation \( \left( {T_{Upa} } \right) \). The overall computational cost of BGSA is defined as in Eq. (B.1)) (Zhang et al. 2018).
Similarly, the time complexity is given in Eq. (B.2))
However, in IBGSA, the hyper clique property was introduced in the initialization phase that reduces the dimension of search space from \( n \) to \( n^{\prime} \) such that \( n^{{\prime }} \ll n \). The overall computational cost \( \left( {C_{Tot }^{{\prime }} } \right) \) and time complexity \( \left( {T_{Tot}^{{\prime }} } \right) \) of IBGSA are given in Eqs. (B.3) and (B.4).
From Eqs. (B.1) to (B.4), it is clear that \( C_{Tot }^{{\prime }} \ll C_{Tot} \) and \( T_{Tot}^{{\prime }} \ll T_{Tot} \). An important point to note is that we introduce mutation operator in the updation process when there exists a conflict, and therefore, it has the least impact on the time and computational complexity.
Rights and permissions
About this article
Cite this article
Gauthama Raman, M.R., Somu, N., Jagarapu, S. et al. An efficient intrusion detection technique based on support vector machine and improved binary gravitational search algorithm. Artif Intell Rev 53, 3255–3286 (2020). https://doi.org/10.1007/s10462-019-09762-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10462-019-09762-z