کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
496317 862856 2012 6 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر نرم افزارهای علوم کامپیوتر
پیش نمایش صفحه اول مقاله
An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection
چکیده انگلیسی

Intrusion detection system (IDS) is to monitor the attacks occurring in the computer or networks. Anomaly intrusion detection plays an important role in IDS to detect new attacks by detecting any deviation from the normal profile. In this paper, an intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection is proposed. The key idea is to take the advantage of support vector machine (SVM), decision tree (DT), and simulated annealing (SA). In the proposed algorithm, SVM and SA can find the best selected features to elevate the accuracy of anomaly intrusion detection. By analyzing the information from using KDD’99 dataset, DT and SA can obtain decision rules for new attacks and can improve accuracy of classification. In addition, the best parameter settings for the DT and SVM are automatically adjusted by SA. The proposed algorithm outperforms other existing approaches. Simulation results demonstrate that the proposed algorithm is successful in detecting anomaly intrusion detection.

Figure optionsDownload as PowerPoint slideHighlights
► In this paper, the key idea is to take the advantage of support vector machine (SVM), decision tree (DT) and simulated annealing (SA).
► In the proposed algorithm, SVM and SA can find the best selected features to elevate the accuracy of anomaly intrusion detection.
► By analyzing the information from using KDD’99 dataset, DT and SA can obtain decision rules for new attacks and can improve accuracy of classification.
► In addition, the best parameter settings for the DT and SVM are automatically adjusted by SA.
► Simulation results demonstrate that the proposed algorithm is successful in detecting anomaly intrusion detection.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Applied Soft Computing - Volume 12, Issue 10, October 2012, Pages 3285–3290
نویسندگان
, , , ,