International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 109

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 2, February 2016


Intrusion Detection in Dynamic Distributed Network Using PSO and SVM Machine Learning Algorithms

Amol S. Jadhav, Dhanashree Kulkarni


Abstract: The number of computers connected to a network and the Internet is increasing with every day. This combined with the increase in networking speed has made intrusion detection a challenging process. System administrators today have to deal with larger number of systems connected to the networks that provide a variety of services. The challenge here is not only to be able to actively monitor all the systems but also to be able to react quickly to different events. Overall intrusion detection involves defense, detection, and importantly, reaction to the intrusion attempts. An intrusion detection system should try to address each of these issues to a high degree. So network security becomes more complex due to the arrival of large no. of new types of attack and lack of dynamic system to detect new type of attacks. In this paper we define the solution to frequently changing network environment. We propose Online Adaboost-based parameterized method. It contains two models, Local model and Global model. In the local model, online Gaussian mixture models (GMMs) and online Adaboost processes are used as weak classifiers. A global detection model is constructed by combining the local parametric model. This combination is achieved by using an algorithm based on support vector machines (SVM) and particle swarm optimization (PSO). This system is able to detect new types of attack when network environment changes. It gives high detection rate and low false alarm rate.


Keywords: Adaboost, detection rate, false alarm rate, network intrusions, parameterized model


Edition: Volume 5 Issue 2, February 2016,


Pages: 1612 - 1617


How to Cite this Article?

Amol S. Jadhav, Dhanashree Kulkarni, "Intrusion Detection in Dynamic Distributed Network Using PSO and SVM Machine Learning Algorithms", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=NOV161512, Volume 5 Issue 2, February 2016, 1612 - 1617

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Adaboost'

Downloads: 37 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 3, March 2021

Pages: 1179 - 1182

Face Detection Using Haar Cascade Classifiers

Bhavana R. Maale, Dr. Suvarna Nandyal

Share this Article

Downloads: 107

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1212 - 1215

A Novel Hybrid Face Recognition Algorithm Based On Neural Network with Fuzzy Sets

Raunil Singh, Kiran Gupta

Share this Article

Similar Articles with Keyword 'detection rate'

Downloads: 92

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Downloads: 103

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1628 - 1631

A Survey On XML-Injection Attack Detection Systems

Swati Ramesh Kesharwani, Aarti Deshpande

Share this Article

Similar Articles with Keyword 'false alarm rate'

Downloads: 112

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3054 - 3057

A Hybrid System Using Genetic Algorithm for Anomaly Intrusion Detection

Arpitha J, Nagaraj Naik

Share this Article

Downloads: 120

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1138 - 1140

Finding Anomaly with Fuzzy Rough C-Means Using Semi-Supervised Approach

Gadekar S. S., Prof. Shinde S. M.

Share this Article

Similar Articles with Keyword 'network intrusions'

Downloads: 123

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014

Pages: 253 - 257

Outlier Recognition in Clustering

Balaram Krishna Chavali, Sudheer Kumar Kotha

Share this Article

Downloads: 154

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 3, March 2018

Pages: 651 - 658

Analysis and Design Modeling for Next Generation Network Intrusion Protection Systems

Nareshkumar Harale, B. B. Meshram

Share this Article
Top