FLBS: Fuzzy lion Bayes system for intrusion detection in wireless communication network
B Gohil Narendrasinh , Dwivedi Vdevyas
Journal of Central South University ›› 2020, Vol. 26 ›› Issue (11) : 3017 -3033.
An important problem in wireless communication networks (WCNs) is that they have a minimum number of resources, which leads to high-security threats. An approach to find and detect the attacks is the intrusion detection system (IDS). In this paper, the fuzzy lion Bayes system (FLBS) is proposed for intrusion detection mechanism. Initially, the data set is grouped into a number of clusters by the fuzzy clustering algorithm. Here, the Naive Bayes classifier is integrated with the lion optimization algorithm and the new lion naive Bayes (LNB) is created for optimally generating the probability measures. Then, the LNB model is applied to each data group, and the aggregated data is generated. After generating the aggregated data, the LNB model is applied to the aggregated data, and the abnormal nodes are identified based on the posterior probability function. The performance of the proposed FLBS system is evaluated using the KDD Cup 99 data and the comparative analysis is performed by the existing methods for the evaluation metrics accuracy and false acceptance rate (FAR). From the experimental results, it can be shown that the proposed system has the maximum performance, which shows the effectiveness of the proposed system in the intrusion detection.
intrusion detection / wireless communication network / fuzzy clustering / naive Bayes classifier / lion naive Bayes system
| [1] |
|
| [2] |
|
| [3] |
|
| [4] |
|
| [5] |
MUKHEDKAR M, POWAR P, GAIKWAD P. Secure non real time image encryption algorithm development using cryptography & steganography [C]// Proceedings of the Annual IEEE India Conference (INDICON). 2015: 1–6. DOI: https://doi.org/10.1109/INDICON.2015.7443808. |
| [6] |
|
| [7] |
|
| [8] |
|
| [9] |
|
| [10] |
|
| [11] |
|
| [12] |
|
| [13] |
|
| [14] |
|
| [15] |
|
| [16] |
|
| [17] |
|
| [18] |
|
| [19] |
|
| [20] |
|
| [21] |
|
| [22] |
|
| [23] |
|
| [24] |
|
| [25] |
RAJAKUMAR B R. Lion algorithm for standard and large scale bilinear system identification: A global optimization based on lion’s social behavior [C]// Proceedings of the IEEE Congress on Evolutionary Computation (CEC). Beijing, China, 2014: 6–11. DOI: https://doi.org/10.1109/CEC.2014.6900561. |
| [26] |
|
| [27] |
|
| [28] |
|
| [29] |
|
| [30] |
|
| [31] |
|
| [32] |
TAVALLAEE M, BAGHERI E, LU W, GHORBANI A A. A detailed analysis of the KDD CUP 99 data set [C]// Proceedings of the IEEE Symposium on Computational Intelligence in Security and Defense Applications, 2009. DOI: https://doi.org/10.1109/CISDA.2009.5356528. |
| [33] |
STOLFO S J, FAN W, LEE W, PRODROMIDIS A, CHAN P K. Costbased modeling for fraud and intrusion detection: Results from the jam project, discex, 2, 1130 [R]. 2000. DOI: https://doi.org/10.1109/DISCEX.2000.821515. |
| [34] |
LIPPMANN R P, FRIED D J, GRAF I, HAINES J W, KENDALL K R, CLUNG D M, WEBER D, WEBSTER S E, WYSCHOGROD D, CUNNINGHAM R K, ZISSMAN M A. Evaluating intrusion detection systems: The 1998 darpa off-line intrusion detection evaluation [C]// Proceedings of the DARPA Information Survivability Conference and Exposition. 2000. DOI: https://doi.org/10.1109/DISCEX.2000.821506. |
| [35] |
NSL-KDD dataset [OL]. [2019-06]. https://www.unb.ca/cic/datasets/nsl.html. |
| [36] |
|
| [37] |
|
| [38] |
|
| [39] |
|
/
| 〈 |
|
〉 |