SlideShare a Scribd company logo
1 of 17
1
Comparison of Genetic Algorithm Optimization on
Artificial Neural Network and Support Vector Machine
Case Study : Intrusion Detection System
Presented by : Amin Dastanpour
PhD Candidate of Network Security
Advanced Informatics School, University Technology Malaysia, Kuala lumpur
2
Table of Content
Introduction Slide 3
Problem of IDS Slide 4
Solution Slide 5
Related Work Slide 6
Artificial Neural Network Slide 7
Support Vector Machine Slide 8
Genetic Algorithm Slide 9
Methodology Slide 10
Data Set Slide 11
Result Slide 12
Conclusion Slide 15
Introduction
Expect a secure network or a secure channel
Intrusion detection system (IDS)
3
Privet network
Problem of IDS
It is only capable of detecting the known attacks
and there should be a frequent update for the
attacks.
Network traffic that needs to be dealt with is very
large and the data distribution is highly
imbalanced.
4
Solution
Machine learning is to discover and learn and then
adapt to the situation that might change over
time .
In IDS, algorithms are deployed on the input
attacks that have been previously unseen in order
to perform the actual process of detection.
Recognizing the new attacks.
Numbers of key features and the process of
detection will be optimized.
5
Related work
Author Method objective
Bin Luo et
al.
four-angle-star based visualized feature
generation approach, (FASVFG)
evaluate the distance between
samples in a 5-class
classification problem
Abraham et
al.
fuzzy rule based
classifiers
framework for Distributed
Intrusion Detection Systems
(DIDS)
Amiri et al. Forward feature selection algorithm(FFSA)
Liner correlation feature selection (LCFS)
Modified mutual information feature selection
(MMIFS)
Propose a feature selection
phase, which can be generally
implemented on any intrusion
detection
Li et al. Ant colony algorithm and support vector
machine (SVM)
This paper proposes a desirable
IDS model with high efficiency
and accuracy
Dastanpour
et al.
Propose a feature selection based on the
Genetic Algorithm (GA) and Support Vector
Machine (SVM)
Improve detection rate with
the less number of features
Dastanpour
et al.
Applying Genetic Algorithms (GA) with
Artificial Neural Networks (ANN) classifier to
detect the attacks in network
Increase of accuracy with the
optimal number of features
6
Artificial Neural Network (ANN)
Artificial Neural Network (ANN) and it has been
used to solve the regression and classification
problems and ability of recognition of the
patterns.
Recognize the new attacks or data from the
previous ones.
Problem Of ANN
The purpose of classification and reorganization, a
large data set is required by the ANN. For
optimizing this data type and making or
generating a feature or pattern.7
Support Vector Machine (SVM)
Support vector machine (SVM) used for solving
classification .
non-linear classification.
Problem of SVM
SVM needs a large set of data.
8
Genetic Algorithm (GA)
Genetic algorithm is an exploratory and adaptive
algorithm for work and search which has been
base on the natural genetics evolutionary ideas.
GA is capable of proposing a solution in a single
solution with an optimal value.
In this Research use GA to Support ANN and SVM.
9
Methodology
10
Optimize the Result of ANN and SVM By GA
DataSet
Knowledge Discovery and Data Mining (KDD CUP
1999) has been applied.
494,020 single connection vectors each of which
contains 41 features and is labeled with exact one
specific attack type : normal or an attack.
Probing
U2R
R2L
DOS
11
Results
12
98
98.5
99
99.5
100
1 3 5 7 9 11 13 15 17 19 21 23 25 27 29 31 33 35 37 39 41
GA- ANN
Number Of Feature
DetectionRate(%)
99.93
99.94
99.95
99.96
99.97
99.98
99.99
100
1 3 5 7 9 11 13 15 17 19 21 23 25 27 29 31 33 35 37 39 41
GA-SVM
Number Of Feature
DetectionRate(%)
Comparison of Results
13
98
98.5
99
99.5
100
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42
DetectionRate(%)
Number Of Feature
GA - SVM
GA - ANN
COMPARING WITH OTHER ALGORITHM
COMPARATIVE OF GA-ANN AND GA-SVM WITH OTHER
ALGORITHM MENTION ON THE RELATED WORK.
14
Name of algorithm Detection rate Number of Feature
LCFS 100 % 21
FFSA 100 % 31
MMIFS 100 % 24
fuzzy rule based 100 % 41
FASVFG 94 % 20
SVM With GA 100 % 24
ANN with GA 100 % 18
Conclusion
In this study GA has been proposed for producing
the detection features. Then the SVM and ANN are
used for the detection system classifier and
comparing with each other to show the
effectiveness of the GA on these methods.
Comparison with the other methods, the highest
detection rate is.
The GA with SVM requires 24 features and GA
with ANN needs 18 for achieving 100% of
detection.
15
References
1) F. Amiri, M. Rezaei Yousefi, C. Lucas, A. Shakery, and N. Yazdani, "Mutual information-
based feature selection for intrusion detection systems," Journal of Network and
Computer Applications, vol. 34, pp. 1184-1199, 2011.
2) A. Abraham, R. Jain, J. Thomas, and S. Y. Han, "D-SCIDS: Distributed soft computing
intrusion detection system," Journal of Network and Computer Applications, vol. 30,
pp. 81-98, 2007.
3) A. Dastanpour and R. A. R. Mahmood, "Feature Selection Based on Genetic Algorithm
and SupportVector Machine for Intrusion Detection System," in The Second
International Conference on Informatics Engineering & Information Science
(ICIEIS2013), 2013, pp. 169-181.
4) A. Dastanpour, S. Ibrahim, and R. Mashinchi, "Using Genetic Algorithm to Supporting
Artificial Neural Network for Intrusion Detection System," in The International
Conference on Computer Security and Digital Investigation (ComSec2014), 2014, pp.
1-13.
5) …
16
17
Presented by : Amin Dastanpour
PhD Candidate of Network Security
Advanced Informatics School, University Technology Malaysia, Kuala lumpur

More Related Content

What's hot

Progress of Machine Learning in the Field of Intrusion Detection Systems
Progress of Machine Learning in the Field of Intrusion Detection SystemsProgress of Machine Learning in the Field of Intrusion Detection Systems
Progress of Machine Learning in the Field of Intrusion Detection Systemsijcisjournal
 
IRJET - Survey on Malware Detection using Deep Learning Methods
IRJET -  	  Survey on Malware Detection using Deep Learning MethodsIRJET -  	  Survey on Malware Detection using Deep Learning Methods
IRJET - Survey on Malware Detection using Deep Learning MethodsIRJET Journal
 
NSL KDD Cup 99 dataset Anomaly Detection using Machine Learning Technique
NSL KDD Cup 99 dataset Anomaly Detection using Machine Learning Technique NSL KDD Cup 99 dataset Anomaly Detection using Machine Learning Technique
NSL KDD Cup 99 dataset Anomaly Detection using Machine Learning Technique Sujeet Suryawanshi
 
Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...
Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...
Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...IJMER
 
Comparison of machine learning methods for breast cancer diagnosis
Comparison of machine learning methods for breast cancer diagnosisComparison of machine learning methods for breast cancer diagnosis
Comparison of machine learning methods for breast cancer diagnosisVenkat Projects
 
Yolinda chiramba Survey Paper
Yolinda chiramba Survey PaperYolinda chiramba Survey Paper
Yolinda chiramba Survey PaperYolinda Chiramba
 
Comparative Performance Analysis of Machine Learning Techniques for Software ...
Comparative Performance Analysis of Machine Learning Techniques for Software ...Comparative Performance Analysis of Machine Learning Techniques for Software ...
Comparative Performance Analysis of Machine Learning Techniques for Software ...csandit
 
A critical review on Adversarial Attacks on Intrusion Detection Systems: Must...
A critical review on Adversarial Attacks on Intrusion Detection Systems: Must...A critical review on Adversarial Attacks on Intrusion Detection Systems: Must...
A critical review on Adversarial Attacks on Intrusion Detection Systems: Must...PhD Assistance
 
Anomaly detection (Unsupervised Learning) in Machine Learning
Anomaly detection (Unsupervised Learning) in Machine LearningAnomaly detection (Unsupervised Learning) in Machine Learning
Anomaly detection (Unsupervised Learning) in Machine LearningKuppusamy P
 
Machine Learning Algorithm & Anomaly detection 2021
Machine Learning Algorithm & Anomaly detection 2021Machine Learning Algorithm & Anomaly detection 2021
Machine Learning Algorithm & Anomaly detection 2021Chakrit Phain
 
A review of machine learning based anomaly detection
A review of machine learning based anomaly detectionA review of machine learning based anomaly detection
A review of machine learning based anomaly detectionMohamed Elfadly
 
Time series anomaly detection using cnn coupled with data augmentation using ...
Time series anomaly detection using cnn coupled with data augmentation using ...Time series anomaly detection using cnn coupled with data augmentation using ...
Time series anomaly detection using cnn coupled with data augmentation using ...Prasenjeet Acharjee
 
Machine learning in computer security
Machine learning in computer securityMachine learning in computer security
Machine learning in computer securityKishor Datta Gupta
 

What's hot (17)

Progress of Machine Learning in the Field of Intrusion Detection Systems
Progress of Machine Learning in the Field of Intrusion Detection SystemsProgress of Machine Learning in the Field of Intrusion Detection Systems
Progress of Machine Learning in the Field of Intrusion Detection Systems
 
IRJET - Survey on Malware Detection using Deep Learning Methods
IRJET -  	  Survey on Malware Detection using Deep Learning MethodsIRJET -  	  Survey on Malware Detection using Deep Learning Methods
IRJET - Survey on Malware Detection using Deep Learning Methods
 
NSL KDD Cup 99 dataset Anomaly Detection using Machine Learning Technique
NSL KDD Cup 99 dataset Anomaly Detection using Machine Learning Technique NSL KDD Cup 99 dataset Anomaly Detection using Machine Learning Technique
NSL KDD Cup 99 dataset Anomaly Detection using Machine Learning Technique
 
1104.0355
1104.03551104.0355
1104.0355
 
Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...
Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...
Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...
 
Comparison of machine learning methods for breast cancer diagnosis
Comparison of machine learning methods for breast cancer diagnosisComparison of machine learning methods for breast cancer diagnosis
Comparison of machine learning methods for breast cancer diagnosis
 
Yolinda chiramba Survey Paper
Yolinda chiramba Survey PaperYolinda chiramba Survey Paper
Yolinda chiramba Survey Paper
 
Comparative Performance Analysis of Machine Learning Techniques for Software ...
Comparative Performance Analysis of Machine Learning Techniques for Software ...Comparative Performance Analysis of Machine Learning Techniques for Software ...
Comparative Performance Analysis of Machine Learning Techniques for Software ...
 
I Dunderstn
I DunderstnI Dunderstn
I Dunderstn
 
Poster: ICPR 2008
Poster: ICPR 2008Poster: ICPR 2008
Poster: ICPR 2008
 
Ij2514951500
Ij2514951500Ij2514951500
Ij2514951500
 
A critical review on Adversarial Attacks on Intrusion Detection Systems: Must...
A critical review on Adversarial Attacks on Intrusion Detection Systems: Must...A critical review on Adversarial Attacks on Intrusion Detection Systems: Must...
A critical review on Adversarial Attacks on Intrusion Detection Systems: Must...
 
Anomaly detection (Unsupervised Learning) in Machine Learning
Anomaly detection (Unsupervised Learning) in Machine LearningAnomaly detection (Unsupervised Learning) in Machine Learning
Anomaly detection (Unsupervised Learning) in Machine Learning
 
Machine Learning Algorithm & Anomaly detection 2021
Machine Learning Algorithm & Anomaly detection 2021Machine Learning Algorithm & Anomaly detection 2021
Machine Learning Algorithm & Anomaly detection 2021
 
A review of machine learning based anomaly detection
A review of machine learning based anomaly detectionA review of machine learning based anomaly detection
A review of machine learning based anomaly detection
 
Time series anomaly detection using cnn coupled with data augmentation using ...
Time series anomaly detection using cnn coupled with data augmentation using ...Time series anomaly detection using cnn coupled with data augmentation using ...
Time series anomaly detection using cnn coupled with data augmentation using ...
 
Machine learning in computer security
Machine learning in computer securityMachine learning in computer security
Machine learning in computer security
 

Viewers also liked

Iaetsd early detection of breast cancer
Iaetsd early detection of breast cancerIaetsd early detection of breast cancer
Iaetsd early detection of breast cancerIaetsd Iaetsd
 
Wavelets AND counterlets
Wavelets  AND  counterletsWavelets  AND  counterlets
Wavelets AND counterletsAvichal Sharma
 
MLHEP 2015: Introductory Lecture #2
MLHEP 2015: Introductory Lecture #2MLHEP 2015: Introductory Lecture #2
MLHEP 2015: Introductory Lecture #2arogozhnikov
 
Comparison of Machine Learning Algorithms
Comparison of Machine Learning Algorithms Comparison of Machine Learning Algorithms
Comparison of Machine Learning Algorithms butest
 
Comparison of the forecasting techniques – arima, ann and svm a review-2
Comparison of the forecasting techniques – arima, ann and svm   a review-2Comparison of the forecasting techniques – arima, ann and svm   a review-2
Comparison of the forecasting techniques – arima, ann and svm a review-2IAEME Publication
 
Comparative Literature Studies
Comparative Literature StudiesComparative Literature Studies
Comparative Literature StudiesDilip Barad
 
Support Vector Machine (SVM) Based Classifier For Khmer Printed Character-set...
Support Vector Machine (SVM) Based Classifier For Khmer Printed Character-set...Support Vector Machine (SVM) Based Classifier For Khmer Printed Character-set...
Support Vector Machine (SVM) Based Classifier For Khmer Printed Character-set...osify
 
Artificial Neural Network in a Tic Tac Toe Symfony Console Application - Symf...
Artificial Neural Network in a Tic Tac Toe Symfony Console Application - Symf...Artificial Neural Network in a Tic Tac Toe Symfony Console Application - Symf...
Artificial Neural Network in a Tic Tac Toe Symfony Console Application - Symf...aferrandini
 
Compegence: Dr. Rajaram Kudli - An Introduction to Artificial Neural Network ...
Compegence: Dr. Rajaram Kudli - An Introduction to Artificial Neural Network ...Compegence: Dr. Rajaram Kudli - An Introduction to Artificial Neural Network ...
Compegence: Dr. Rajaram Kudli - An Introduction to Artificial Neural Network ...COMPEGENCE
 
Support vector machine
Support vector machineSupport vector machine
Support vector machineMusa Hawamdah
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemAparna Bhadran
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemAkhil Kumar
 
Image Classification And Support Vector Machine
Image Classification And Support Vector MachineImage Classification And Support Vector Machine
Image Classification And Support Vector MachineShao-Chuan Wang
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionUmesh Dhital
 

Viewers also liked (20)

Iaetsd early detection of breast cancer
Iaetsd early detection of breast cancerIaetsd early detection of breast cancer
Iaetsd early detection of breast cancer
 
10.1.1.151.4974
10.1.1.151.497410.1.1.151.4974
10.1.1.151.4974
 
Wavelets AND counterlets
Wavelets  AND  counterletsWavelets  AND  counterlets
Wavelets AND counterlets
 
1725 1731
1725 17311725 1731
1725 1731
 
MLHEP 2015: Introductory Lecture #2
MLHEP 2015: Introductory Lecture #2MLHEP 2015: Introductory Lecture #2
MLHEP 2015: Introductory Lecture #2
 
Comparison of Machine Learning Algorithms
Comparison of Machine Learning Algorithms Comparison of Machine Learning Algorithms
Comparison of Machine Learning Algorithms
 
Seminarppt
SeminarpptSeminarppt
Seminarppt
 
50120140506006
5012014050600650120140506006
50120140506006
 
[IJET-V1I3P22] Authors :Dipali D. Deokar, Chandrasekhar G. Patil.
[IJET-V1I3P22] Authors :Dipali D. Deokar, Chandrasekhar G. Patil.[IJET-V1I3P22] Authors :Dipali D. Deokar, Chandrasekhar G. Patil.
[IJET-V1I3P22] Authors :Dipali D. Deokar, Chandrasekhar G. Patil.
 
Comparison of the forecasting techniques – arima, ann and svm a review-2
Comparison of the forecasting techniques – arima, ann and svm   a review-2Comparison of the forecasting techniques – arima, ann and svm   a review-2
Comparison of the forecasting techniques – arima, ann and svm a review-2
 
About SVM
About SVMAbout SVM
About SVM
 
Comparative Literature Studies
Comparative Literature StudiesComparative Literature Studies
Comparative Literature Studies
 
Support Vector Machine (SVM) Based Classifier For Khmer Printed Character-set...
Support Vector Machine (SVM) Based Classifier For Khmer Printed Character-set...Support Vector Machine (SVM) Based Classifier For Khmer Printed Character-set...
Support Vector Machine (SVM) Based Classifier For Khmer Printed Character-set...
 
Artificial Neural Network in a Tic Tac Toe Symfony Console Application - Symf...
Artificial Neural Network in a Tic Tac Toe Symfony Console Application - Symf...Artificial Neural Network in a Tic Tac Toe Symfony Console Application - Symf...
Artificial Neural Network in a Tic Tac Toe Symfony Console Application - Symf...
 
Compegence: Dr. Rajaram Kudli - An Introduction to Artificial Neural Network ...
Compegence: Dr. Rajaram Kudli - An Introduction to Artificial Neural Network ...Compegence: Dr. Rajaram Kudli - An Introduction to Artificial Neural Network ...
Compegence: Dr. Rajaram Kudli - An Introduction to Artificial Neural Network ...
 
Support vector machine
Support vector machineSupport vector machine
Support vector machine
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Image Classification And Support Vector Machine
Image Classification And Support Vector MachineImage Classification And Support Vector Machine
Image Classification And Support Vector Machine
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 

Similar to My

IRJET- Intrusion Detection using IP Binding in Real Network
IRJET- Intrusion Detection using IP Binding in Real NetworkIRJET- Intrusion Detection using IP Binding in Real Network
IRJET- Intrusion Detection using IP Binding in Real NetworkIRJET Journal
 
Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...CloudTechnologies
 
MultiAgent artificial immune system for network intrusion detection
MultiAgent artificial immune system for network intrusion detectionMultiAgent artificial immune system for network intrusion detection
MultiAgent artificial immune system for network intrusion detectionAboul Ella Hassanien
 
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...IJNSA Journal
 
An ann approach for network
An ann approach for networkAn ann approach for network
An ann approach for networkIJNSA Journal
 
Injection Attack detection using ML for
Injection Attack detection using ML  forInjection Attack detection using ML  for
Injection Attack detection using ML forKhazane Hassan
 
Intelligent Handwritten Digit Recognition using Artificial Neural Network
Intelligent Handwritten Digit Recognition using Artificial Neural NetworkIntelligent Handwritten Digit Recognition using Artificial Neural Network
Intelligent Handwritten Digit Recognition using Artificial Neural NetworkIJERA Editor
 
rpaper
rpaperrpaper
rpaperimu409
 
ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...
ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...
ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...IJNSA Journal
 
A Stacked Generalization Ensemble Approach for Improved Intrusion Detection
A Stacked Generalization Ensemble Approach for Improved Intrusion DetectionA Stacked Generalization Ensemble Approach for Improved Intrusion Detection
A Stacked Generalization Ensemble Approach for Improved Intrusion DetectionIJCSIS Research Publications
 
A novel ensemble modeling for intrusion detection system
A novel ensemble modeling for intrusion detection system A novel ensemble modeling for intrusion detection system
A novel ensemble modeling for intrusion detection system IJECEIAES
 
Botnet detection using Wgans for security
Botnet detection using Wgans for securityBotnet detection using Wgans for security
Botnet detection using Wgans for securityssuser3f5a831
 
Exploring and comparing various machine and deep learning technique algorithm...
Exploring and comparing various machine and deep learning technique algorithm...Exploring and comparing various machine and deep learning technique algorithm...
Exploring and comparing various machine and deep learning technique algorithm...CSITiaesprime
 
A Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISA Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISIJSRD
 
A Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISA Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISIJSRD
 
11421ijcPROGRESS OF MACHINE LEARNING IN THE FIELD OF INTRUSION DETECTION SYST...
11421ijcPROGRESS OF MACHINE LEARNING IN THE FIELD OF INTRUSION DETECTION SYST...11421ijcPROGRESS OF MACHINE LEARNING IN THE FIELD OF INTRUSION DETECTION SYST...
11421ijcPROGRESS OF MACHINE LEARNING IN THE FIELD OF INTRUSION DETECTION SYST...ijcisjournal
 
COMPUTER INTRUSION DETECTION BY TWOOBJECTIVE FUZZY GENETIC ALGORITHM
COMPUTER INTRUSION DETECTION BY TWOOBJECTIVE FUZZY GENETIC ALGORITHMCOMPUTER INTRUSION DETECTION BY TWOOBJECTIVE FUZZY GENETIC ALGORITHM
COMPUTER INTRUSION DETECTION BY TWOOBJECTIVE FUZZY GENETIC ALGORITHMcscpconf
 
ANALYSIS AND COMPARISON STUDY OF DATA MINING ALGORITHMS USING RAPIDMINER
ANALYSIS AND COMPARISON STUDY OF DATA MINING ALGORITHMS USING RAPIDMINERANALYSIS AND COMPARISON STUDY OF DATA MINING ALGORITHMS USING RAPIDMINER
ANALYSIS AND COMPARISON STUDY OF DATA MINING ALGORITHMS USING RAPIDMINERIJCSEA Journal
 

Similar to My (20)

my IEEE
my IEEEmy IEEE
my IEEE
 
IRJET- Intrusion Detection using IP Binding in Real Network
IRJET- Intrusion Detection using IP Binding in Real NetworkIRJET- Intrusion Detection using IP Binding in Real Network
IRJET- Intrusion Detection using IP Binding in Real Network
 
Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...
 
MultiAgent artificial immune system for network intrusion detection
MultiAgent artificial immune system for network intrusion detectionMultiAgent artificial immune system for network intrusion detection
MultiAgent artificial immune system for network intrusion detection
 
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...
 
An ann approach for network
An ann approach for networkAn ann approach for network
An ann approach for network
 
Injection Attack detection using ML for
Injection Attack detection using ML  forInjection Attack detection using ML  for
Injection Attack detection using ML for
 
Intelligent Handwritten Digit Recognition using Artificial Neural Network
Intelligent Handwritten Digit Recognition using Artificial Neural NetworkIntelligent Handwritten Digit Recognition using Artificial Neural Network
Intelligent Handwritten Digit Recognition using Artificial Neural Network
 
rpaper
rpaperrpaper
rpaper
 
ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...
ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...
ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...
 
A Stacked Generalization Ensemble Approach for Improved Intrusion Detection
A Stacked Generalization Ensemble Approach for Improved Intrusion DetectionA Stacked Generalization Ensemble Approach for Improved Intrusion Detection
A Stacked Generalization Ensemble Approach for Improved Intrusion Detection
 
A novel ensemble modeling for intrusion detection system
A novel ensemble modeling for intrusion detection system A novel ensemble modeling for intrusion detection system
A novel ensemble modeling for intrusion detection system
 
Botnet detection using Wgans for security
Botnet detection using Wgans for securityBotnet detection using Wgans for security
Botnet detection using Wgans for security
 
Exploring and comparing various machine and deep learning technique algorithm...
Exploring and comparing various machine and deep learning technique algorithm...Exploring and comparing various machine and deep learning technique algorithm...
Exploring and comparing various machine and deep learning technique algorithm...
 
A Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISA Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFIS
 
A Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISA Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFIS
 
11421ijcPROGRESS OF MACHINE LEARNING IN THE FIELD OF INTRUSION DETECTION SYST...
11421ijcPROGRESS OF MACHINE LEARNING IN THE FIELD OF INTRUSION DETECTION SYST...11421ijcPROGRESS OF MACHINE LEARNING IN THE FIELD OF INTRUSION DETECTION SYST...
11421ijcPROGRESS OF MACHINE LEARNING IN THE FIELD OF INTRUSION DETECTION SYST...
 
IDS survey.pptx
IDS survey.pptxIDS survey.pptx
IDS survey.pptx
 
COMPUTER INTRUSION DETECTION BY TWOOBJECTIVE FUZZY GENETIC ALGORITHM
COMPUTER INTRUSION DETECTION BY TWOOBJECTIVE FUZZY GENETIC ALGORITHMCOMPUTER INTRUSION DETECTION BY TWOOBJECTIVE FUZZY GENETIC ALGORITHM
COMPUTER INTRUSION DETECTION BY TWOOBJECTIVE FUZZY GENETIC ALGORITHM
 
ANALYSIS AND COMPARISON STUDY OF DATA MINING ALGORITHMS USING RAPIDMINER
ANALYSIS AND COMPARISON STUDY OF DATA MINING ALGORITHMS USING RAPIDMINERANALYSIS AND COMPARISON STUDY OF DATA MINING ALGORITHMS USING RAPIDMINER
ANALYSIS AND COMPARISON STUDY OF DATA MINING ALGORITHMS USING RAPIDMINER
 

My

  • 1. 1 Comparison of Genetic Algorithm Optimization on Artificial Neural Network and Support Vector Machine Case Study : Intrusion Detection System Presented by : Amin Dastanpour PhD Candidate of Network Security Advanced Informatics School, University Technology Malaysia, Kuala lumpur
  • 2. 2 Table of Content Introduction Slide 3 Problem of IDS Slide 4 Solution Slide 5 Related Work Slide 6 Artificial Neural Network Slide 7 Support Vector Machine Slide 8 Genetic Algorithm Slide 9 Methodology Slide 10 Data Set Slide 11 Result Slide 12 Conclusion Slide 15
  • 3. Introduction Expect a secure network or a secure channel Intrusion detection system (IDS) 3 Privet network
  • 4. Problem of IDS It is only capable of detecting the known attacks and there should be a frequent update for the attacks. Network traffic that needs to be dealt with is very large and the data distribution is highly imbalanced. 4
  • 5. Solution Machine learning is to discover and learn and then adapt to the situation that might change over time . In IDS, algorithms are deployed on the input attacks that have been previously unseen in order to perform the actual process of detection. Recognizing the new attacks. Numbers of key features and the process of detection will be optimized. 5
  • 6. Related work Author Method objective Bin Luo et al. four-angle-star based visualized feature generation approach, (FASVFG) evaluate the distance between samples in a 5-class classification problem Abraham et al. fuzzy rule based classifiers framework for Distributed Intrusion Detection Systems (DIDS) Amiri et al. Forward feature selection algorithm(FFSA) Liner correlation feature selection (LCFS) Modified mutual information feature selection (MMIFS) Propose a feature selection phase, which can be generally implemented on any intrusion detection Li et al. Ant colony algorithm and support vector machine (SVM) This paper proposes a desirable IDS model with high efficiency and accuracy Dastanpour et al. Propose a feature selection based on the Genetic Algorithm (GA) and Support Vector Machine (SVM) Improve detection rate with the less number of features Dastanpour et al. Applying Genetic Algorithms (GA) with Artificial Neural Networks (ANN) classifier to detect the attacks in network Increase of accuracy with the optimal number of features 6
  • 7. Artificial Neural Network (ANN) Artificial Neural Network (ANN) and it has been used to solve the regression and classification problems and ability of recognition of the patterns. Recognize the new attacks or data from the previous ones. Problem Of ANN The purpose of classification and reorganization, a large data set is required by the ANN. For optimizing this data type and making or generating a feature or pattern.7
  • 8. Support Vector Machine (SVM) Support vector machine (SVM) used for solving classification . non-linear classification. Problem of SVM SVM needs a large set of data. 8
  • 9. Genetic Algorithm (GA) Genetic algorithm is an exploratory and adaptive algorithm for work and search which has been base on the natural genetics evolutionary ideas. GA is capable of proposing a solution in a single solution with an optimal value. In this Research use GA to Support ANN and SVM. 9
  • 10. Methodology 10 Optimize the Result of ANN and SVM By GA
  • 11. DataSet Knowledge Discovery and Data Mining (KDD CUP 1999) has been applied. 494,020 single connection vectors each of which contains 41 features and is labeled with exact one specific attack type : normal or an attack. Probing U2R R2L DOS 11
  • 12. Results 12 98 98.5 99 99.5 100 1 3 5 7 9 11 13 15 17 19 21 23 25 27 29 31 33 35 37 39 41 GA- ANN Number Of Feature DetectionRate(%) 99.93 99.94 99.95 99.96 99.97 99.98 99.99 100 1 3 5 7 9 11 13 15 17 19 21 23 25 27 29 31 33 35 37 39 41 GA-SVM Number Of Feature DetectionRate(%)
  • 13. Comparison of Results 13 98 98.5 99 99.5 100 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 DetectionRate(%) Number Of Feature GA - SVM GA - ANN
  • 14. COMPARING WITH OTHER ALGORITHM COMPARATIVE OF GA-ANN AND GA-SVM WITH OTHER ALGORITHM MENTION ON THE RELATED WORK. 14 Name of algorithm Detection rate Number of Feature LCFS 100 % 21 FFSA 100 % 31 MMIFS 100 % 24 fuzzy rule based 100 % 41 FASVFG 94 % 20 SVM With GA 100 % 24 ANN with GA 100 % 18
  • 15. Conclusion In this study GA has been proposed for producing the detection features. Then the SVM and ANN are used for the detection system classifier and comparing with each other to show the effectiveness of the GA on these methods. Comparison with the other methods, the highest detection rate is. The GA with SVM requires 24 features and GA with ANN needs 18 for achieving 100% of detection. 15
  • 16. References 1) F. Amiri, M. Rezaei Yousefi, C. Lucas, A. Shakery, and N. Yazdani, "Mutual information- based feature selection for intrusion detection systems," Journal of Network and Computer Applications, vol. 34, pp. 1184-1199, 2011. 2) A. Abraham, R. Jain, J. Thomas, and S. Y. Han, "D-SCIDS: Distributed soft computing intrusion detection system," Journal of Network and Computer Applications, vol. 30, pp. 81-98, 2007. 3) A. Dastanpour and R. A. R. Mahmood, "Feature Selection Based on Genetic Algorithm and SupportVector Machine for Intrusion Detection System," in The Second International Conference on Informatics Engineering & Information Science (ICIEIS2013), 2013, pp. 169-181. 4) A. Dastanpour, S. Ibrahim, and R. Mashinchi, "Using Genetic Algorithm to Supporting Artificial Neural Network for Intrusion Detection System," in The International Conference on Computer Security and Digital Investigation (ComSec2014), 2014, pp. 1-13. 5) … 16
  • 17. 17 Presented by : Amin Dastanpour PhD Candidate of Network Security Advanced Informatics School, University Technology Malaysia, Kuala lumpur