• DocumentCode
    2836387
  • Title

    A rule generation model using S-PSO for Misuse Intrusion Detection

  • Author

    Zhang Yi ; Li-Jun, Zhang

  • Author_Institution
    Sch. of Comput. Sci. & Eng., Beihang Univ., Beijing, China
  • Volume
    3
  • fYear
    2010
  • fDate
    22-24 Oct. 2010
  • Abstract
    Facing the increasingly important problem of computer security, Intrusion Detection System (IDS) has become an essential mechanism to protect computer and network system from malicious behaviors. In pursing high accuracy of detection rate, research in IDS is focusing on rule generation. Developing rules manually through human analysis on attack signatures often results in meaningful but costly work as it is difficult to define threshold. In this paper, we present a rule generation model for Misuse Intrusion Detection using a combination of statistical approach and particle swarm optimization (PSO) to achieve the rapid feature selection and rule optimization. Experimental results prove the effectiveness and robustness of the model we proposed, rules generated from which show both a high classification rate and a low false positive rate.
  • Keywords
    computer network security; particle swarm optimisation; statistical analysis; IDS; PSO; S-PSO; attack signatures; computer security problem; detection rate; intrusion detection system; malicious behaviors; misuse intrusion detection; network system; particle swarm optimization; rule generation model; statistical approach; Computer security; feature selection; intrusion detection; misuse detection; particle swarm optimization; rule generation;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Application and System Modeling (ICCASM), 2010 International Conference on
  • Conference_Location
    Taiyuan
  • Print_ISBN
    978-1-4244-7235-2
  • Electronic_ISBN
    978-1-4244-7237-6
  • Type

    conf

  • DOI
    10.1109/ICCASM.2010.5620540
  • Filename
    5620540