Using a Particle Swarm Optimization Approach for Evolutionary Fuzzy Rule Learning: A Case Study of Intrusion Detection

Size: px
Start display at page:

Download "Using a Particle Swarm Optimization Approach for Evolutionary Fuzzy Rule Learning: A Case Study of Intrusion Detection"

Transcription

1 Using a Particle Swarm Optimization pproach for Evolutionary Fuzzy Rule Learning: Case Study of Intrusion Detection Mohammad Saniee badeh saniee@ce.sharif.edu Jafar Habibi habibi@sharif.edu Department of Computer Engineering Sharif University of Technology zadi ve., Tehran, Iran Saman liari aliari@ce.sharif.edu bstract n evolutionary fuzzy rule-learning algorithm is proposed in this paper. This algorithm utilizes a Particle Swarm Optimization (PSO) approach to search the neighborhood of each indivual in the problem search space. The evolutionary algorithm is based on the Michigan approach, which means that each indivual in the population represents a fuzzy if-then rule. The proposed learning approach is performed on intrusion detection that is a complex classification problem. Results show that the final classification system is capable of detecting known intrusive behaviors in a computer network with an acceptable performance. Keywords: Evolutionary Computation, Fuzzy Rule Learning, Particle Swarm Optimization, Intrusion Detection. 1 Introduction With the growing number of intrusions into networked computers has grows and raises concerns about computer security. Intrusion Detection Systems are important security tools, placing inse a protected network and looking for known or potential threats in network traffic and/or audit data recorded by hosts. Basically, an IDS analyzes information about users behaviors from various sources such as audit trail, system table, and network usage data. The problem of intrusion detection has been studied extensively in computer security [1, 2], and has recently received a lot of attention in machine learning and data mining [3, 4]. The intrusion detection techniques can be dived into two groups according to the type of information they use: misuse detection and anomaly detection. Signature or misuse detection is based on patterns of known intrusions. In this case, the intrusion detection problem is a classification problem. This approach allows the detection of intrusions which the system has learned their signatures perfectly. To remedy the problem of detecting novel attacks, anomaly detection attempts to construct a model according to the statistical knowledge about the normal activity of the computer system. In this case, intrusions correspond to anomalous network activity, i.e., to traffic whose statistical profile deviates significantly from the normal. In this paper, we exploit a genetic fuzzy system to develop a novel IDS based on misuse detection. The goal of our algorithm is to find high quality fuzzy if-then rules to predict the class of input patterns correctly. Traditionally, fuzzy if-then rules were gained from human experts. Recently various methods have been suggested for automatically generating and adusting fuzzy if-then rules without using the a of human experts [5]. Genetic algorithms have been used as rule generation and optimization tools in the design of fuzzy rulebased systems. Those G-based studies on the design of fuzzy rule based systems are usually referred to as fuzzy genetics-based machine

2 learning methods. These methods are classified into Pittsburgh or Michigan approaches. [6, 7] The Pittsburgh approach [6] is similar to the traditional G where every indivual in the population is a set of rule, representing a complete solution to the learning problem. Crossover and mutation are then applied in the usual way to create new generations of such populations. The Michigan approach [7], however, has generally used a different partial solution to the overall learning task. Each indivual represents a single rule, and through cooperation with the other rules in the population, the overall problem is being solved. The proposed algorithm is a new model based on the Michigan approach. In this algorithm, the global population is dived into some subpopulations. The number of subpopulations is equal to the number of classes in the classification problem. For each subpopulation, all of the indivuals represent rules with the same class in the prediction part of the rule according to the fact that each indivual in the presented algorithm represents a rule which has the form if condition then prediction. We have empowered our algorithm using a heuristic local search procedure, which is based on Particle Swarm Optimization (PSO). This procedure aims to improve the quality of derived fuzzy rules by searching their neighborhoods according to some restrictions. Section 3 will discuss about the details of this procedure clearly. This paper is organized as follows: In section 2 we propose the structure of Michigan based genetic fuzzy rule learning algorithm. Section 3 presents the PSO-based heuristic local search procedure. The following section will discuss about the experimental results, which we have obtained. t the last section of the paper we derive some conclusions. 2 Evolutionary Fuzzy Rule Learning First, let us explain about the method of coding fuzzy rules, which is used in this paper. Each fuzzy if-then rule is coded as a string. The following symbols are used for denoting the five linguistic values (Figure 1): small ( 1 ), medium small ( 2 ), medium ( 3 ), medium large ( 4 ) and large ( 5 ). For example, the following fuzzy if-then rule is coded as ( 3, 2, 5, 1 ) : If x 1 is medium and x 2 is medium small and x 3 is large and x 4 is small then Class CF = CF. C with Figure 1: Membership functions of five linguistic values (S: small, MS: medium small, M: medium, ML: medium large, L: large). Outline of the proposed Michigan approach based IDS algorithm is as follows: Step 1: Generate an initial population of fuzzy if then rules. (Initialization) Step 2: Generate new fuzzy if then rules by genetic operations. (Generation) Step 3: Each indivual can live according to its age number. The procedure that accomplishes this lifetime is based on a PSO heuristic algorithm. (PSO-Based Local Search) Step 3: Replace a part of the current population with the newly generated rules. (Replacement) Step 4: Terminate the algorithm if a stopping condition is satisfied, otherwise return to Step 2. (Internal termination test) Step 5: Save the best indivuals of the resulted population. Terminate the whole algorithm if a maximum number of iterations is satisfied. Otherwise, go to step 1. Each step of this fuzzy classifier system is described as follows: 2.1 Initialization Let us denote the number of fuzzy if-then rules in the population by N pop. To produce an initial population, N pop fuzzy if-then rules are generated according to a random pattern in the train dataset [7]. The evolutionary fuzzy system (Figure 2) is consered for each of the classes of the

3 classification problem separately. One of the important benefits of this separation is that the learning system can focus on each of the classes of the classification problem. ccording to this fact, the mentioned random pattern is extracted according to the patterns of the training dataset, which their consequent class is the same as the class that the algorithm works on. Next, for this random pattern, we determine the most compatible combination of antecedent fuzzy sets using only the five linguistic values (Figure. 1). The compatibility of antecedent fuzzy rules with the random pattern is calculated by equation (1). µ R ( x p ) = µ ( x p1 )... µ p = 1,2,...,m ( x 1 n pn ), (1) where µ i (.) is the membership function of i. fter generating each fuzzy if-then rule, the consequent class of this rule is determined according to (2). β R ) = max{ β ( R ),..., β ( R )}. (2) ( Classhˆ Class1 where, β Class h h = 1,2,...,c Class c ( R ) = µ ( x p ) NClass h, xp Class h (3) where β Class h ( R ) is the sum of the compatibility grades of the training patterns in Class h with the fuzzy if then rule R and N Class h is the number of training patterns which their corresponding class is Class h. Each of the fuzzy rules in the final classification has a certainty grade, which denotes the strength of that fuzzy rule. This number is calculated according to (4). CF where, B = h = β ˆ ( R ) β Class h β ˆ h β Class h ( R ) c h= 1 ( c 1) Class h ( R ) (4) (5) When a rule set S is given, an input pattern x p = ( xp1, xp2,..., xpn) is classified by a single winner rule R in S, which is determined as follows: [7] { ( x ). CF R S} µ ˆ ( x ). CF = max µ. (6) p That is, the winner rule has the maximum product of the compatibility and the certainty grade CF. The classification is reected if no fuzzy if then rule is compatible with the input pattern x p (i.e., µ ( x p ) = 0 for R S). The generation of each fuzzy rule is accepted only if its consequent class is the same as its corresponding random pattern class. Otherwise, the generated fuzzy rule is reected and the rule generation process is repeated. fter generation of N pop fuzzy if-then rules, the fitness value of each rule is evaluated by classifying all the given training patterns using the set of fuzzy if then rules in the current population. The fitness value of the fuzzy if then rule is evaluated by the following fitness function: fitness R ) = NCP( R ) (7) ( where, NCP ( R ) denotes the number of correctly classified training patterns by rule R. 2.2 Generation pair of fuzzy if-then rules is selected from the current population to generate new fuzzy if-then rules for the next population. Each fuzzy if-then rule in the current population is selected by the tournament selection procedure. crossover operation is applied to a selected random pair of fuzzy if then rules with a prespecified crossover probability. Note that the selected indivuals for crossover operation should be different. In computer simulations of this paper, we used the one-point crossover. fter performing the crossover operation, consequent classes of the generated indivuals are determined. If these classes are the same as their parent classes then the generated indivuals are accepted, otherwise the crossover operation is repeated until a prespecified iteration number for each indivual p

4 that its consequent class is not the same as its parents. We call this number X. repeat With a pre-specified mutation probability, each antecedent fuzzy set of fuzzy if then rules is randomly replaced with a different antecedent fuzzy set after the crossover operation. fter performing the mutation operation, consequent class of the mutated indivual is determined. If the result class is the same as the class of the indivual before the mutation operation, the mutated indivual is accepted; otherwise, the mutation operation is repeated until a prespecified iteration number. We call this number M. repeat The above procedure is iterated until a prespecified number of pairs of fuzzy if-then rules are generated. 2.3 Local Search In order to improve the classification rate of the population, we conser a lifetime for each indivual of the current population. We simulate this lifetime using a local search algorithm, which is based on a Particle Swarm Optimization heuristic. Before describing the details of the PSO-based local search procedure, which will be done in section 3, it is essential to introduce the concept of age for each indivual. n indivual can search its neighborhood (or can live) according to its age. The age of each indivual depends on its fitness. In other words, fitter indivuals have greater age or opportunity to live. This rule is based on the concept of survival of the fittest as Darwin mentioned [6]. To accomplish this ea we determine the age of each indivual using equation (8). fitness( R ) ge( R ) = wage (8) N Class h where, wage denotes a weight which depends on the CPU speed of the computer that the algorithm runs on (The faster the CPU the lower the w age ). Note that the division in the equation is for normalizing the fitness of R. ccording to equation (13), each indivual can live and improves its quality (fitness) as much as its age number determines. The unit of age number is in milliseconds. 2.4 Replacement pre-specified number of fuzzy if then rules in the current population are replaced with the newly generated rules. In our fuzzy classifier system, P repr percent of the worst rules with the smallest fitness values are removed from the current population and (100 - P repr ) percent of the newly generated fuzzy if then rules are added. 2.5 Termination Tests We can use any stopping condition for terminating the internal cycle of the Michigan based fuzzy classification algorithm. In computer simulations of this paper, we used the total number of generations as a stopping condition. Fuzzy rules of the final population that their fitness is not zero are stored in the Fuzzy Rule Pool (FRP). This pool is updated until a prespecified number of iterations for the external cycle of the evolutionary PSO-Based algorithm. 3 PSO Heuristic for Local Search PSO was developed by Kennedy and Eberhart [8]. The PSO is inspired by the social behavior of a flock of migrating birds trying to reach an unknown destination. In PSO, each solution is a bird in the flock and is referred to as a particle. particle is analogous to a chromosome (population member) in Gs. s opposed to Gs, the evolutionary process in the PSO does not create new birds from parent ones. Rather, the birds in the population only evolve their social behavior and accordingly their movement towards a destination. Physically, this mimics a flock of birds that communicate together as they fly. Each bird looks in a specific direction, and then when communicating together, they entify the bird that is in the best location. ccordingly, each bird speeds towards the best bird using a velocity that depends on its current position. Each bird, then, investigates the search space from its new local position, and the process repeats until the flock reaches a desired destination. It is important to note that the process involves both intelligence and social

5 interaction so that birds learn from their own experience (local search) and also from the experience of others around them (global search). PSO is similar to the other evolutionary algorithms in that the system is initialized with a population of random solutions. Each potential solution, call particles, flies in the D- dimensional problem space with a velocity, which is dynamically adusted according to the flying experience of its own and its colleagues. The location of the ith particle is represented as X. The best previous position ( which giving the best fitness value) of the ith particle is recorded and represented as P. which is also called pbest. The index of the best pbest among all the particles is represented by symbol g. The location P gd is also called gbest. The velocity for ith particle is represented as V. PSO is initialized with a population of random solutions of the obective function. The position of each particle is updated by a new velocity calculated through (9) and (10): V w V + c * η *( P X * * 2 *( P gd X ) + c η ) (9) X X + V (10) This section will present the PSO algorithm, which is used in the structure of the main evolutionary fuzzy system as a local search procedure. 3.1 RM Concept Before presenting the PSO-Based Local Search algorithm, let us introduce the RM concept, which we have used in this algorithm. Conser a fuzzy rule of the population with n antecedents, R = ( ai ), i = 1,2,..., n (11) Here we define Rule ntecedent Modification (RM) Operator, RM ( i, ) as replacing the current linguistic value of the rule i th precondition with th linguistic value. Then we define a new fuzzy rule by using the RM- Operator according to (12). R = R + RM i, ) (12) ( Therefore, the plus sign + in (12) has its new meaning. It can be given a concrete example: Suppose there is a classification problem with five inputs, equation (13) shows a sample fuzzy rule for this problem: R = ( S, ML, L, MS, L) (13) The RM-Operator is RM ( 5, 2 ). The result is demonstrated in equation (14). R = R + RM ( 5, 2 ) = ( S, ML, L, MS, MS) (14) Rule ntecedent Modification Sequence (RMS) is made up of one or more RM Operators: RMS = RM, RM,..., RM ) (15) ( 1 2 n where RM 1, RM 2,..., RM n are RM operators, here the order of the RM Operators in RMS is important. RM Sequence acting on a solution means all the RM Operators of the RM Sequence act on the solution in order. This can be described by the following formula: R = R + RMS = R + ( RM 1, RM 2,..., RM n ) = (...(( R + RM ) + RM 2 ) RM ) (16) 1 n Different RM Sequences acting on the same solution may produce the same new solution. ll these RM Sequences are named the equivalent set of RM Sequences. In the equivalent set, the sequence which has the least RM Operator is called Basic RM Sequence of the set or Basic RM Sequence (BRMS) in short. Several RM Sequences can be merged into a new RM Sequence; we define the operator as merging two RM Sequences into a new RM Sequence. Suppose there are two RM Sequences, RMS 1 and RMS 2, RMS 1 and RMS 2 act on solution R in order, namely RMs1 first, RMS2 second, we get a new solution R, and there is another RM Sequence RM S acting on the same solution

6 R, then get the Same solution R, described as follows: RMS = RMS1 RMS 2 (17) RM S and RMS1 RMS2 are in the same equivalent set. Suppose there are two solutions, R and R B, and our task is to construct a Basic RM Sequence BRMS B which can act on RB to get solution R, we define: B BRMS = R R (18) B Here the sign - also has its new meaning. We can modify the nodes in R B according to R from left to right to get BRMS B. So there must be an equation R = R + BRMS. B B For example, two solutions are presented in (19) and (20) R = ( L, MS, L, S, S) (19) R B = ( L, L, ML, S, MS) (20) The BRMS BRMS B B = is calculated as follows: ( RM (2, 2 ), RM (3, 5 ), RM (5, 1 )) (21) 3.2 PSO-Based Local Search Formula (9) has already no longer been suitable for our task, which is rule extraction for a classification problem. We update it as follows: V V α ( P X ) β *( P X ) (22) * gd where α and β are random numbers between 0 and 1. α *( P X ) means all RM Operators in Basic RM Sequence P X should be maintained with the probability of α, it is the same as β ( P X ). * From here we can see that the bigger the value of α the greater the influence of P is (more RM Operators in P X will be maintained). It is also the same as β ( P X ). * Outline of the PSO-Based Local Search is presented in figure 2. Step 1 Initialization: each of the particles positioned according to the current rule. The initial velocity of each particle is determined randomly (a random RM operator). Step 2 Step 3 Step 4 If the lifetime of the current rule is finished, go to Step 5. For all the particles in position the next position X as follows: X 3.1 Calculate difference between P, according to the method which is X, calculate and proposed, BRMS = P X. BRMS is a basic sequence. 3.2 Calculate BRMSB = Pgd X which BRMS B is also a basic sequence. 3.3 Calculate the velocity V according to equation (22), and then transform RM Sequence V to a Basic RM Sequence. 3.4 Calculate the new solution using equation (16). 3.5 Update P if the new solution is superior to P. Update Pgd if there is new best solution which is superior to P gd. GOTO Step 2. Step 5 Sketch the global best rule as the result of local search procedure. Figure 2: Outline of the PSO-Based Local Search Procedure.

7 4 Experimental Results Experiments were carried out using the 1998 DRP intrusion detection evaluation data set prepared and managed by MIT Lincoln Labs. We used the subset of this dataset that was preprocessed by the Columbia University and distributed as part of the UCI KDD rchive [9]. The available database is made up of a large number of network connections related to normal and malicious traffic. Each connection is represented with a 41-dimensional feature vector. Connections are also labeled as belonging to one out of five classes, i.e., normal traffic, Denial of Service (DOS) attacks, Remote to Local (R2L) attacks, User to Root (U2R) attacks, and Probing attacks (PRB). Features were linearly normalized so that they took values within the range [0, 1]. The training data set contains 650 randomly generated points from the five classes, with the number of data from each class proportional to its size, except that the smallest class (U2R) is completely included. different randomly selected set of 9600 points is used for testing the proposed fuzzy classifier system. This section will compare the performance of the proposed PSO-Based Evolutionary Fuzzy System with other approaches for the intrusion detection problem. Table I presents parameter settings for the PSO- Based Evolutionary Fuzzy System, which is used in this paper. TBLE I Parameters specification in computer simulations Parameter Value population size ( N pop ) 20 crossover probability ( P c ) 90 mutation probability ( P m ) 10 age weight parameter ( w age ) number of particles ( N particle ) 20 replacement percentage ( P rep ) 20 stopping condition of the internal algorithm cycle 100 stopping condition of the external algorithm cycle 4 The effect of PSO-Based Local Search procedure can be investigated according to figures 3 and 4. ccording to these figures, we can comprehend that our proposed local search procedure is capable of improving the performance of fuzzy classifier system when it is applied on strong enough rules. However, performing this procedure only on very strong rules will reduce the procedure efficiency. The classification accuracy of our hybr algorithm is shown in Table II along with the performance achieved by a simple evolutionary fuzzy system (without local search step) and some of the other algorithms (EFRID [3], Winner entry [10]). s it is clear, the Evolutionary Fuzzy Systems (with or without local search procedure) are completely competitive to other approaches for intrusion detection. Furthermore, by comparing the classification accuracies of the first two rows of Table II, the hybr evolutionary fuzzy system with PSO-Based local search outperforms the simple evolutionary system. Thus Table III compares the performance of proposed evolutionary algorithms against other methods (EFRID [3] and RIPPER [11]). Our approach resulted in both high detection rate and low false alarm rate. ccording to Table III we can conclude that using evolutionary fuzzy systems resulted in a more reliable intrusion detection system. 5 Conclusions In this paper, a novel PSO-Based Local Search procedure is introduced. The proposed local search procedure is used in the structure of a Michigan based evolutionary fuzzy system. The capability of the resulted hybr fuzzy system is investigated according to the intrusion detection classification problem. Computer simulations on DRP datasets demonstrate high performance of PSO-Based evolutionary fuzzy system for intrusion detection. Our future work is to conser the comprehensibility of the final detection system as another obective for our classification problem. To accomplish this obective we should minimize number of antecedents of each fuzzy rule while maximizing the classification rate of it.

8 Classification Rate NORML U2R R2L DOS PRB Classification Rate NORML U2R R2L DOS PRB Generation Figure 3: Evolution without the local search step TBLE II COMPRISON OF SOME LGORITHMS CLSS lgorithm NORML U2R R2L DOS PRB PSO+EFS Simple EFS EFRID Winner Entry Generation Figure 4: Evolution with the Local Search step TBLE III PERFORMNCE COMPRISON lgorithm Detection Rate False larm Rate PSO+EFS Simple EFS EFRID RIPPER-rtificial nomalies References [1] J. llen,. Christie, W. Fithen, J. McHugh, J. Pickel, and E. Stoner. (1999). State of the practice of intrusion detection technologies. Technical Report CMU/SEI99 -TR-028. ESC , Carnegie Mellon, Software Engineering Institute, Pittsburgh Pennsylvania, [2] S. xelsson (2000). Intrusion detection systems: survey and taxonomy. Technical Report No 99-15, Dept. of Computer Engineering, Chalmers University of Technology, Sweden, March [3] J. Gomez, and D. Dasgupta, "Evolving Fuzzy Classifies for Intrusion Detection," Proceedings of the 2002 IEEE Information ssurance Workshop, Jun [4] M. Saniee badeh, J. Habibi, and C. Lucas, Intrusion Detection Using a Fuzzy Genetics- Based Learning lgorithm, Journal of Network and Computer pplications, In Press, [5] C. L. Karr, and E. J. Gentry, Fuzzy control of ph using genetic algorithms, IEEE Trans. on Fuzzy Systems, vol. 1, pp , February, [6] B. Carse, T.C. Fogarty, and. Muntro, Evolving fuzzy rule based controllers using genetic algorithms, Fuzzy Sets and Systems, vol. 80, no. 3, 3, pp , June, [7] H. Ishibuchi, and T. Nakashima, "Improving the Performance of Fuzzy Classifier Systems for Pattern Classification Problems with Continuous ttributes", IEEE Transactions on Industrial Electronics, vol. 46, no. 6, December 1999 [8] Kennedy J, Eberhart R. Particle swarm optimization. Proceedings of the IEEE international conference on neural networks (Perth, ustralia), Piscataway, NJ: IEEE Service Center; [9] KDD-cup data set: kddcup99.html. [10] C. Elkan, Results of the KDD_99 classifier learning, CM SIGKDD Explorations 1, pp , [11] W. Fan, W. Lee, M. Miller, S. J. Stolfo, and P. K. Chan, Using artificial anomalies to detect unknown and know network intrusions, Proceedings of the First IEEE International Conference on Data Mining, 2001.

INDUCTION OF FUZZY CLASSIFICATION SYSTEMS VIA EVOLUTIONARY ACO-BASED ALGORITHMS

INDUCTION OF FUZZY CLASSIFICATION SYSTEMS VIA EVOLUTIONARY ACO-BASED ALGORITHMS INDUTION OF FUZZY LSSIFITION SYSTEMS VI EVOLUTIONRY O-BSED LGORITHMS MOHMMD SNIEE BDEH, JFR HBIBI, and EMD SOROUSH omputer Engineering Department, Sharif University of Technology, Tehran, Iran saniee@ce.sharif.edu,

More information

IDuFG: Introducing an Intrusion Detection using Hybrid Fuzzy Genetic Approach

IDuFG: Introducing an Intrusion Detection using Hybrid Fuzzy Genetic Approach International Journal of Network Security, Vol.17, No.6, PP.754-770, Nov. 2015 754 IDuFG: Introducing an Intrusion Detection using Hybrid Fuzzy Genetic Approach Ghazaleh Javadzadeh 1, Reza Azmi 2 (Corresponding

More information

Traffic Signal Control Based On Fuzzy Artificial Neural Networks With Particle Swarm Optimization

Traffic Signal Control Based On Fuzzy Artificial Neural Networks With Particle Swarm Optimization Traffic Signal Control Based On Fuzzy Artificial Neural Networks With Particle Swarm Optimization J.Venkatesh 1, B.Chiranjeevulu 2 1 PG Student, Dept. of ECE, Viswanadha Institute of Technology And Management,

More information

GENETIC ALGORITHM VERSUS PARTICLE SWARM OPTIMIZATION IN N-QUEEN PROBLEM

GENETIC ALGORITHM VERSUS PARTICLE SWARM OPTIMIZATION IN N-QUEEN PROBLEM Journal of Al-Nahrain University Vol.10(2), December, 2007, pp.172-177 Science GENETIC ALGORITHM VERSUS PARTICLE SWARM OPTIMIZATION IN N-QUEEN PROBLEM * Azhar W. Hammad, ** Dr. Ban N. Thannoon Al-Nahrain

More information

Approach Using Genetic Algorithm for Intrusion Detection System

Approach Using Genetic Algorithm for Intrusion Detection System Approach Using Genetic Algorithm for Intrusion Detection System 544 Abhijeet Karve Government College of Engineering, Aurangabad, Dr. Babasaheb Ambedkar Marathwada University, Aurangabad, Maharashtra-

More information

Improving Tree-Based Classification Rules Using a Particle Swarm Optimization

Improving Tree-Based Classification Rules Using a Particle Swarm Optimization Improving Tree-Based Classification Rules Using a Particle Swarm Optimization Chi-Hyuck Jun *, Yun-Ju Cho, and Hyeseon Lee Department of Industrial and Management Engineering Pohang University of Science

More information

A Neuro-Fuzzy Classifier for Intrusion Detection Systems

A Neuro-Fuzzy Classifier for Intrusion Detection Systems . 11 th International CSI Computer Conference (CSICC 2006), School of Computer Science, IPM, Jan. 24-26, 2006, Tehran, Iran. A Neuro-Fuzzy Classifier for Intrusion Detection Systems Adel Nadjaran Toosi

More information

Hybrid Feature Selection for Modeling Intrusion Detection Systems

Hybrid Feature Selection for Modeling Intrusion Detection Systems Hybrid Feature Selection for Modeling Intrusion Detection Systems Srilatha Chebrolu, Ajith Abraham and Johnson P Thomas Department of Computer Science, Oklahoma State University, USA ajith.abraham@ieee.org,

More information

Preprocessing of Stream Data using Attribute Selection based on Survival of the Fittest

Preprocessing of Stream Data using Attribute Selection based on Survival of the Fittest Preprocessing of Stream Data using Attribute Selection based on Survival of the Fittest Bhakti V. Gavali 1, Prof. Vivekanand Reddy 2 1 Department of Computer Science and Engineering, Visvesvaraya Technological

More information

Review on Data Mining Techniques for Intrusion Detection System

Review on Data Mining Techniques for Intrusion Detection System Review on Data Mining Techniques for Intrusion Detection System Sandeep D 1, M. S. Chaudhari 2 Research Scholar, Dept. of Computer Science, P.B.C.E, Nagpur, India 1 HoD, Dept. of Computer Science, P.B.C.E,

More information

Feature weighting using particle swarm optimization for learning vector quantization classifier

Feature weighting using particle swarm optimization for learning vector quantization classifier Journal of Physics: Conference Series PAPER OPEN ACCESS Feature weighting using particle swarm optimization for learning vector quantization classifier To cite this article: A Dongoran et al 2018 J. Phys.:

More information

Multiobjective Formulations of Fuzzy Rule-Based Classification System Design

Multiobjective Formulations of Fuzzy Rule-Based Classification System Design Multiobjective Formulations of Fuzzy Rule-Based Classification System Design Hisao Ishibuchi and Yusuke Nojima Graduate School of Engineering, Osaka Prefecture University, - Gakuen-cho, Sakai, Osaka 599-853,

More information

CHAPTER 5 ENERGY MANAGEMENT USING FUZZY GENETIC APPROACH IN WSN

CHAPTER 5 ENERGY MANAGEMENT USING FUZZY GENETIC APPROACH IN WSN 97 CHAPTER 5 ENERGY MANAGEMENT USING FUZZY GENETIC APPROACH IN WSN 5.1 INTRODUCTION Fuzzy systems have been applied to the area of routing in ad hoc networks, aiming to obtain more adaptive and flexible

More information

Argha Roy* Dept. of CSE Netaji Subhash Engg. College West Bengal, India.

Argha Roy* Dept. of CSE Netaji Subhash Engg. College West Bengal, India. Volume 3, Issue 3, March 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Training Artificial

More information

LEARNING WEIGHTS OF FUZZY RULES BY USING GRAVITATIONAL SEARCH ALGORITHM

LEARNING WEIGHTS OF FUZZY RULES BY USING GRAVITATIONAL SEARCH ALGORITHM International Journal of Innovative Computing, Information and Control ICIC International c 2013 ISSN 1349-4198 Volume 9, Number 4, April 2013 pp. 1593 1601 LEARNING WEIGHTS OF FUZZY RULES BY USING GRAVITATIONAL

More information

A NEW APPROACH TO SOLVE ECONOMIC LOAD DISPATCH USING PARTICLE SWARM OPTIMIZATION

A NEW APPROACH TO SOLVE ECONOMIC LOAD DISPATCH USING PARTICLE SWARM OPTIMIZATION A NEW APPROACH TO SOLVE ECONOMIC LOAD DISPATCH USING PARTICLE SWARM OPTIMIZATION Manjeet Singh 1, Divesh Thareja 2 1 Department of Electrical and Electronics Engineering, Assistant Professor, HCTM Technical

More information

Research Article Path Planning Using a Hybrid Evolutionary Algorithm Based on Tree Structure Encoding

Research Article Path Planning Using a Hybrid Evolutionary Algorithm Based on Tree Structure Encoding e Scientific World Journal, Article ID 746260, 8 pages http://dx.doi.org/10.1155/2014/746260 Research Article Path Planning Using a Hybrid Evolutionary Algorithm Based on Tree Structure Encoding Ming-Yi

More information

Kyrre Glette INF3490 Evolvable Hardware Cartesian Genetic Programming

Kyrre Glette INF3490 Evolvable Hardware Cartesian Genetic Programming Kyrre Glette kyrrehg@ifi INF3490 Evolvable Hardware Cartesian Genetic Programming Overview Introduction to Evolvable Hardware (EHW) Cartesian Genetic Programming Applications of EHW 3 Evolvable Hardware

More information

Cell-to-switch assignment in. cellular networks. barebones particle swarm optimization

Cell-to-switch assignment in. cellular networks. barebones particle swarm optimization Cell-to-switch assignment in cellular networks using barebones particle swarm optimization Sotirios K. Goudos a), Konstantinos B. Baltzis, Christos Bachtsevanidis, and John N. Sahalos RadioCommunications

More information

A study on fuzzy intrusion detection

A study on fuzzy intrusion detection A study on fuzzy intrusion detection J.T. Yao S.L. Zhao L. V. Saxton Department of Computer Science University of Regina Regina, Saskatchewan, Canada S4S 0A2 E-mail: [jtyao,zhao200s,saxton]@cs.uregina.ca

More information

CHAPTER 6 HYBRID AI BASED IMAGE CLASSIFICATION TECHNIQUES

CHAPTER 6 HYBRID AI BASED IMAGE CLASSIFICATION TECHNIQUES CHAPTER 6 HYBRID AI BASED IMAGE CLASSIFICATION TECHNIQUES 6.1 INTRODUCTION The exploration of applications of ANN for image classification has yielded satisfactory results. But, the scope for improving

More information

Meta- Heuristic based Optimization Algorithms: A Comparative Study of Genetic Algorithm and Particle Swarm Optimization

Meta- Heuristic based Optimization Algorithms: A Comparative Study of Genetic Algorithm and Particle Swarm Optimization 2017 2 nd International Electrical Engineering Conference (IEEC 2017) May. 19 th -20 th, 2017 at IEP Centre, Karachi, Pakistan Meta- Heuristic based Optimization Algorithms: A Comparative Study of Genetic

More information

Hybridization of Fuzzy GBML Approaches for Pattern Classification Problems

Hybridization of Fuzzy GBML Approaches for Pattern Classification Problems H. Ishibuchi, T. Yamamoto, and T. Nakashima, Hybridization of fuzzy GBML approaches for pattern classification problems, IEEE Trans. on Systems, Man, and Cybernetics- Part B: Cybernetics, vol. 35, no.

More information

Discrete Particle Swarm Optimization With Local Search Strategy for Rule Classification

Discrete Particle Swarm Optimization With Local Search Strategy for Rule Classification Discrete Particle Swarm Optimization With Local Search Strategy for Rule Classification Min Chen and Simone A. Ludwig Department of Computer Science North Dakota State University Fargo, ND, USA min.chen@my.ndsu.edu,

More information

Chapter 14 Global Search Algorithms

Chapter 14 Global Search Algorithms Chapter 14 Global Search Algorithms An Introduction to Optimization Spring, 2015 Wei-Ta Chu 1 Introduction We discuss various search methods that attempts to search throughout the entire feasible set.

More information

Model Generation for an Intrusion Detection System Using Genetic Algorithms

Model Generation for an Intrusion Detection System Using Genetic Algorithms Model Generation for an Intrusion Detection System Using Genetic Algorithms Adhitya Chittur November 27, 2001 Ossining High School Ossining, NY Summary As malicious intrusions (commonly termed hacks )

More information

Efficient fuzzy rule generation: A new approach using data mining principles and rule weighting

Efficient fuzzy rule generation: A new approach using data mining principles and rule weighting Efficient fuzzy rule generation: new approach using data mining principles and rule weighting O. Dehzangi Engineering, Islamic zad University of Marvdasht, Marvdasht, Iran dehzangi@cse.shirazu.ac.ir M.

More information

Reconfiguration Optimization for Loss Reduction in Distribution Networks using Hybrid PSO algorithm and Fuzzy logic

Reconfiguration Optimization for Loss Reduction in Distribution Networks using Hybrid PSO algorithm and Fuzzy logic Bulletin of Environment, Pharmacology and Life Sciences Bull. Env. Pharmacol. Life Sci., Vol 4 [9] August 2015: 115-120 2015 Academy for Environment and Life Sciences, India Online ISSN 2277-1808 Journal

More information

Particle Swarm Optimization applied to Pattern Recognition

Particle Swarm Optimization applied to Pattern Recognition Particle Swarm Optimization applied to Pattern Recognition by Abel Mengistu Advisor: Dr. Raheel Ahmad CS Senior Research 2011 Manchester College May, 2011-1 - Table of Contents Introduction... - 3 - Objectives...

More information

Particle Swarm Optimization

Particle Swarm Optimization Particle Swarm Optimization Gonçalo Pereira INESC-ID and Instituto Superior Técnico Porto Salvo, Portugal gpereira@gaips.inesc-id.pt April 15, 2011 1 What is it? Particle Swarm Optimization is an algorithm

More information

A GENETIC ALGORITHM FOR CLUSTERING ON VERY LARGE DATA SETS

A GENETIC ALGORITHM FOR CLUSTERING ON VERY LARGE DATA SETS A GENETIC ALGORITHM FOR CLUSTERING ON VERY LARGE DATA SETS Jim Gasvoda and Qin Ding Department of Computer Science, Pennsylvania State University at Harrisburg, Middletown, PA 17057, USA {jmg289, qding}@psu.edu

More information

Particle Swarm Optimization Approach for Scheduling of Flexible Job Shops

Particle Swarm Optimization Approach for Scheduling of Flexible Job Shops Particle Swarm Optimization Approach for Scheduling of Flexible Job Shops 1 Srinivas P. S., 2 Ramachandra Raju V., 3 C.S.P Rao. 1 Associate Professor, V. R. Sdhartha Engineering College, Vijayawada 2 Professor,

More information

Feeder Reconfiguration Using Binary Coding Particle Swarm Optimization

Feeder Reconfiguration Using Binary Coding Particle Swarm Optimization 488 International Journal Wu-Chang of Control, Wu Automation, and Men-Shen and Systems, Tsai vol. 6, no. 4, pp. 488-494, August 2008 Feeder Reconfiguration Using Binary Coding Particle Swarm Optimization

More information

A Study on Optimization Algorithms for Clustering Gene Expression Data

A Study on Optimization Algorithms for Clustering Gene Expression Data A Study on Optimization Algorithms for Clustering Gene Expression Data Athul Jose 1, Chandrasekar P 2 PG scholor Dept of CSE, Bannari Amman Institute of technology, Sathyamangalam, Tamilnadu, India 1,

More information

International Conference on Modeling and SimulationCoimbatore, August 2007

International Conference on Modeling and SimulationCoimbatore, August 2007 International Conference on Modeling and SimulationCoimbatore, 27-29 August 2007 OPTIMIZATION OF FLOWSHOP SCHEDULING WITH FUZZY DUE DATES USING A HYBRID EVOLUTIONARY ALGORITHM M.S.N.Kiran Kumara, B.B.Biswalb,

More information

Evolutionary Techniques in Circuit Design and Optimization

Evolutionary Techniques in Circuit Design and Optimization roceedings of the 6th WSEAS International Conference on Simulation, Modelling and Optimization, Lisbon, ortugal, September -, 6 7 Evolutionary Techniques in Circuit Design and Optimization CECÍLIA REIS,

More information

IMPROVING THE PARTICLE SWARM OPTIMIZATION ALGORITHM USING THE SIMPLEX METHOD AT LATE STAGE

IMPROVING THE PARTICLE SWARM OPTIMIZATION ALGORITHM USING THE SIMPLEX METHOD AT LATE STAGE IMPROVING THE PARTICLE SWARM OPTIMIZATION ALGORITHM USING THE SIMPLEX METHOD AT LATE STAGE Fang Wang, and Yuhui Qiu Intelligent Software and Software Engineering Laboratory, Southwest-China Normal University,

More information

Genetic-PSO Fuzzy Data Mining With Divide and Conquer Strategy

Genetic-PSO Fuzzy Data Mining With Divide and Conquer Strategy Genetic-PSO Fuzzy Data Mining With Divide and Conquer Strategy Amin Jourabloo Department of Computer Engineering, Sharif University of Technology, Tehran, Iran E-mail: jourabloo@ce.sharif.edu Abstract

More information

A HYBRID ALGORITHM BASED ON PARTICLE SWARM OPTIMIZATION

A HYBRID ALGORITHM BASED ON PARTICLE SWARM OPTIMIZATION INTERNATIONAL JOURNAL OF INFORMATION AND SYSTEMS SCIENCES Volume 1, Number 3-4, Pages 275-282 2005 Institute for Scientific Computing and Information A HYBRID ALGORITHM BASED ON PARTICLE SWARM OPTIMIZATION

More information

Three-Dimensional Off-Line Path Planning for Unmanned Aerial Vehicle Using Modified Particle Swarm Optimization

Three-Dimensional Off-Line Path Planning for Unmanned Aerial Vehicle Using Modified Particle Swarm Optimization Three-Dimensional Off-Line Path Planning for Unmanned Aerial Vehicle Using Modified Particle Swarm Optimization Lana Dalawr Jalal Abstract This paper addresses the problem of offline path planning for

More information

Using CODEQ to Train Feed-forward Neural Networks

Using CODEQ to Train Feed-forward Neural Networks Using CODEQ to Train Feed-forward Neural Networks Mahamed G. H. Omran 1 and Faisal al-adwani 2 1 Department of Computer Science, Gulf University for Science and Technology, Kuwait, Kuwait omran.m@gust.edu.kw

More information

1 Lab 5: Particle Swarm Optimization

1 Lab 5: Particle Swarm Optimization 1 Lab 5: Particle Swarm Optimization This laboratory requires the following: (The development tools are installed in GR B0 01 already): C development tools (gcc, make, etc.) Webots simulation software

More information

Learning Fuzzy Rules by Evolution for Mobile Agent Control

Learning Fuzzy Rules by Evolution for Mobile Agent Control Learning Fuzzy Rules by Evolution for Mobile Agent Control George Chronis, James Keller and Marjorie Skubic Dept. of Computer Engineering and Computer Science, University of Missouri-Columbia, email: gchronis@ece.missouri.edu

More information

Mobile Robot Path Planning in Static Environments using Particle Swarm Optimization

Mobile Robot Path Planning in Static Environments using Particle Swarm Optimization Mobile Robot Path Planning in Static Environments using Particle Swarm Optimization M. Shahab Alam, M. Usman Rafique, and M. Umer Khan Abstract Motion planning is a key element of robotics since it empowers

More information

Hybrid Particle Swarm-Based-Simulated Annealing Optimization Techniques

Hybrid Particle Swarm-Based-Simulated Annealing Optimization Techniques Hybrid Particle Swarm-Based-Simulated Annealing Optimization Techniques Nasser Sadati Abstract Particle Swarm Optimization (PSO) algorithms recently invented as intelligent optimizers with several highly

More information

Wrapper Feature Selection using Discrete Cuckoo Optimization Algorithm Abstract S.J. Mousavirad and H. Ebrahimpour-Komleh* 1 Department of Computer and Electrical Engineering, University of Kashan, Kashan,

More information

An improved PID neural network controller for long time delay systems using particle swarm optimization algorithm

An improved PID neural network controller for long time delay systems using particle swarm optimization algorithm An improved PID neural network controller for long time delay systems using particle swarm optimization algorithm A. Lari, A. Khosravi and A. Alfi Faculty of Electrical and Computer Engineering, Noushirvani

More information

Internal vs. External Parameters in Fitness Functions

Internal vs. External Parameters in Fitness Functions Internal vs. External Parameters in Fitness Functions Pedro A. Diaz-Gomez Computing & Technology Department Cameron University Lawton, Oklahoma 73505, USA pdiaz-go@cameron.edu Dean F. Hougen School of

More information

1 Lab + Hwk 5: Particle Swarm Optimization

1 Lab + Hwk 5: Particle Swarm Optimization 1 Lab + Hwk 5: Particle Swarm Optimization This laboratory requires the following equipment: C programming tools (gcc, make), already installed in GR B001 Webots simulation software Webots User Guide Webots

More information

Intrusion Detection System based on Support Vector Machine and BN-KDD Data Set

Intrusion Detection System based on Support Vector Machine and BN-KDD Data Set Intrusion Detection System based on Support Vector Machine and BN-KDD Data Set Razieh Baradaran, Department of information technology, university of Qom, Qom, Iran R.baradaran@stu.qom.ac.ir Mahdieh HajiMohammadHosseini,

More information

A Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence

A Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 206) A Network Intrusion Detection System Architecture Based on Snort and Computational Intelligence Tao Liu, a, Da

More information

IJCSC Volume 4 Number 2 September 2013 pp ISSN

IJCSC Volume 4 Number 2 September 2013 pp ISSN Improving the performance of IDS using Genetic Algorithm Kuldeep Kumar, Ramkala Punia Computer Programmer, CCS Haryana Agriculture University, Hisar, Haryana *Teaching Associate, Deptt. of CSE, Guru Jambheshwar

More information

A New Selection Operator - CSM in Genetic Algorithms for Solving the TSP

A New Selection Operator - CSM in Genetic Algorithms for Solving the TSP A New Selection Operator - CSM in Genetic Algorithms for Solving the TSP Wael Raef Alkhayri Fahed Al duwairi High School Aljabereyah, Kuwait Suhail Sami Owais Applied Science Private University Amman,

More information

ARTIFICIAL INTELLIGENCE (CSCU9YE ) LECTURE 5: EVOLUTIONARY ALGORITHMS

ARTIFICIAL INTELLIGENCE (CSCU9YE ) LECTURE 5: EVOLUTIONARY ALGORITHMS ARTIFICIAL INTELLIGENCE (CSCU9YE ) LECTURE 5: EVOLUTIONARY ALGORITHMS Gabriela Ochoa http://www.cs.stir.ac.uk/~goc/ OUTLINE Optimisation problems Optimisation & search Two Examples The knapsack problem

More information

Improving interpretability in approximative fuzzy models via multi-objective evolutionary algorithms.

Improving interpretability in approximative fuzzy models via multi-objective evolutionary algorithms. Improving interpretability in approximative fuzzy models via multi-objective evolutionary algorithms. Gómez-Skarmeta, A.F. University of Murcia skarmeta@dif.um.es Jiménez, F. University of Murcia fernan@dif.um.es

More information

FITTING PIECEWISE LINEAR FUNCTIONS USING PARTICLE SWARM OPTIMIZATION

FITTING PIECEWISE LINEAR FUNCTIONS USING PARTICLE SWARM OPTIMIZATION Suranaree J. Sci. Technol. Vol. 19 No. 4; October - December 2012 259 FITTING PIECEWISE LINEAR FUNCTIONS USING PARTICLE SWARM OPTIMIZATION Pavee Siriruk * Received: February 28, 2013; Revised: March 12,

More information

Flow-based Anomaly Intrusion Detection System Using Neural Network

Flow-based Anomaly Intrusion Detection System Using Neural Network Flow-based Anomaly Intrusion Detection System Using Neural Network tational power to analyze only the basic characteristics of network flow, so as to Intrusion Detection systems (KBIDES) classify the data

More information

Evolving SQL Queries for Data Mining

Evolving SQL Queries for Data Mining Evolving SQL Queries for Data Mining Majid Salim and Xin Yao School of Computer Science, The University of Birmingham Edgbaston, Birmingham B15 2TT, UK {msc30mms,x.yao}@cs.bham.ac.uk Abstract. This paper

More information

Genetic Algorithm for Finding Shortest Path in a Network

Genetic Algorithm for Finding Shortest Path in a Network Intern. J. Fuzzy Mathematical Archive Vol. 2, 2013, 43-48 ISSN: 2320 3242 (P), 2320 3250 (online) Published on 26 August 2013 www.researchmathsci.org International Journal of Genetic Algorithm for Finding

More information

An Optimized Genetic Algorithm with Classification Approach used for Intrusion Detection

An Optimized Genetic Algorithm with Classification Approach used for Intrusion Detection International Journal of Computer Networks and Communications Security VOL. 3, NO. 1, JANUARY 2015, 6 10 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) An Optimized

More information

An Efficient Analysis for High Dimensional Dataset Using K-Means Hybridization with Ant Colony Optimization Algorithm

An Efficient Analysis for High Dimensional Dataset Using K-Means Hybridization with Ant Colony Optimization Algorithm An Efficient Analysis for High Dimensional Dataset Using K-Means Hybridization with Ant Colony Optimization Algorithm Prabha S. 1, Arun Prabha K. 2 1 Research Scholar, Department of Computer Science, Vellalar

More information

An Iterative Approach to Record Deduplication

An Iterative Approach to Record Deduplication An Iterative Approach to Record Deduplication M. Roshini Karunya, S. Lalitha, B.Tech., M.E., II ME (CSE), Gnanamani College of Technology, A.K.Samuthiram, India 1 Assistant Professor, Gnanamani College

More information

Intrusion Detection System with FGA and MLP Algorithm

Intrusion Detection System with FGA and MLP Algorithm Intrusion Detection System with FGA and MLP Algorithm International Journal of Engineering Research & Technology (IJERT) Miss. Madhuri R. Yadav Department Of Computer Engineering Siddhant College Of Engineering,

More information

International Journal of Digital Application & Contemporary research Website: (Volume 1, Issue 7, February 2013)

International Journal of Digital Application & Contemporary research Website:   (Volume 1, Issue 7, February 2013) Performance Analysis of GA and PSO over Economic Load Dispatch Problem Sakshi Rajpoot sakshirajpoot1988@gmail.com Dr. Sandeep Bhongade sandeepbhongade@rediffmail.com Abstract Economic Load dispatch problem

More information

Simplifying Handwritten Characters Recognition Using a Particle Swarm Optimization Approach

Simplifying Handwritten Characters Recognition Using a Particle Swarm Optimization Approach ISSN 2286-4822, www.euacademic.org IMPACT FACTOR: 0.485 (GIF) Simplifying Handwritten Characters Recognition Using a Particle Swarm Optimization Approach MAJIDA ALI ABED College of Computers Sciences and

More information

Handling Multi Objectives of with Multi Objective Dynamic Particle Swarm Optimization

Handling Multi Objectives of with Multi Objective Dynamic Particle Swarm Optimization Handling Multi Objectives of with Multi Objective Dynamic Particle Swarm Optimization Richa Agnihotri #1, Dr. Shikha Agrawal #1, Dr. Rajeev Pandey #1 # Department of Computer Science Engineering, UIT,

More information

FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION. Abstract

FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION. Abstract FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION Susan M. Bridges, Associate Professor Rayford B. Vaughn, Associate Professor Department of Computer Science Mississippi State University

More information

CHAPTER 2 CONVENTIONAL AND NON-CONVENTIONAL TECHNIQUES TO SOLVE ORPD PROBLEM

CHAPTER 2 CONVENTIONAL AND NON-CONVENTIONAL TECHNIQUES TO SOLVE ORPD PROBLEM 20 CHAPTER 2 CONVENTIONAL AND NON-CONVENTIONAL TECHNIQUES TO SOLVE ORPD PROBLEM 2.1 CLASSIFICATION OF CONVENTIONAL TECHNIQUES Classical optimization methods can be classified into two distinct groups:

More information

The movement of the dimmer firefly i towards the brighter firefly j in terms of the dimmer one s updated location is determined by the following equat

The movement of the dimmer firefly i towards the brighter firefly j in terms of the dimmer one s updated location is determined by the following equat An Improved Firefly Algorithm for Optimization Problems Amarita Ritthipakdee 1, Arit Thammano, Nol Premasathian 3, and Bunyarit Uyyanonvara 4 Abstract Optimization problem is one of the most difficult

More information

An Ensemble Data Mining Approach for Intrusion Detection in a Computer Network

An Ensemble Data Mining Approach for Intrusion Detection in a Computer Network International Journal of Science and Engineering Investigations vol. 6, issue 62, March 2017 ISSN: 2251-8843 An Ensemble Data Mining Approach for Intrusion Detection in a Computer Network Abisola Ayomide

More information

A Modified PSO Technique for the Coordination Problem in Presence of DG

A Modified PSO Technique for the Coordination Problem in Presence of DG A Modified PSO Technique for the Coordination Problem in Presence of DG M. El-Saadawi A. Hassan M. Saeed Dept. of Electrical Engineering, Faculty of Engineering, Mansoura University, Egypt saadawi1@gmail.com-

More information

Genetic Algorithms. Kang Zheng Karl Schober

Genetic Algorithms. Kang Zheng Karl Schober Genetic Algorithms Kang Zheng Karl Schober Genetic algorithm What is Genetic algorithm? A genetic algorithm (or GA) is a search technique used in computing to find true or approximate solutions to optimization

More information

Derivation of Relational Fuzzy Classification Rules Using Evolutionary Computation

Derivation of Relational Fuzzy Classification Rules Using Evolutionary Computation Derivation of Relational Fuzzy Classification Rules Using Evolutionary Computation Vahab Akbarzadeh Alireza Sadeghian Marcus V. dos Santos Abstract An evolutionary system for derivation of fuzzy classification

More information

Evolutionary Approaches for Resilient Surveillance Management. Ruidan Li and Errin W. Fulp. U N I V E R S I T Y Department of Computer Science

Evolutionary Approaches for Resilient Surveillance Management. Ruidan Li and Errin W. Fulp. U N I V E R S I T Y Department of Computer Science Evolutionary Approaches for Resilient Surveillance Management Ruidan Li and Errin W. Fulp WAKE FOREST U N I V E R S I T Y Department of Computer Science BioSTAR Workshop, 2017 Surveillance Systems Growing

More information

The k-means Algorithm and Genetic Algorithm

The k-means Algorithm and Genetic Algorithm The k-means Algorithm and Genetic Algorithm k-means algorithm Genetic algorithm Rough set approach Fuzzy set approaches Chapter 8 2 The K-Means Algorithm The K-Means algorithm is a simple yet effective

More information

1. Introduction. 2. Motivation and Problem Definition. Volume 8 Issue 2, February Susmita Mohapatra

1. Introduction. 2. Motivation and Problem Definition. Volume 8 Issue 2, February Susmita Mohapatra Pattern Recall Analysis of the Hopfield Neural Network with a Genetic Algorithm Susmita Mohapatra Department of Computer Science, Utkal University, India Abstract: This paper is focused on the implementation

More information

An Introduction to Evolutionary Algorithms

An Introduction to Evolutionary Algorithms An Introduction to Evolutionary Algorithms Karthik Sindhya, PhD Postdoctoral Researcher Industrial Optimization Group Department of Mathematical Information Technology Karthik.sindhya@jyu.fi http://users.jyu.fi/~kasindhy/

More information

Particle Swarm Optimization

Particle Swarm Optimization Dario Schor, M.Sc., EIT schor@ieee.org Space Systems Department Magellan Aerospace Winnipeg Winnipeg, Manitoba 1 of 34 Optimization Techniques Motivation Optimization: Where, min x F(x), subject to g(x)

More information

A Hybrid Approach for Misbehavior Detection in Wireless Ad-Hoc Networks

A Hybrid Approach for Misbehavior Detection in Wireless Ad-Hoc Networks A Hybrid Approach for Misbehavior Detection in Wireless Ad-Hoc Networks S. Balachandran, D. Dasgupta, L. Wang Intelligent Security Systems Research Lab Department of Computer Science The University of

More information

A Multiobjective Memetic Algorithm Based on Particle Swarm Optimization

A Multiobjective Memetic Algorithm Based on Particle Swarm Optimization A Multiobjective Memetic Algorithm Based on Particle Swarm Optimization Dr. Liu Dasheng James Cook University, Singapore / 48 Outline of Talk. Particle Swam Optimization 2. Multiobjective Particle Swarm

More information

Modified K-Means Algorithm for Genetic Clustering

Modified K-Means Algorithm for Genetic Clustering 24 Modified K-Means Algorithm for Genetic Clustering Mohammad Babrdel Bonab Islamic Azad University Bonab Branch, Iran Summary The K-Means Clustering Approach is one of main algorithms in the literature

More information

Comparison of Some Evolutionary Algorithms for Approximate Solutions of Optimal Control Problems

Comparison of Some Evolutionary Algorithms for Approximate Solutions of Optimal Control Problems Australian Journal of Basic and Applied Sciences, 4(8): 3366-3382, 21 ISSN 1991-8178 Comparison of Some Evolutionary Algorithms for Approximate Solutions of Optimal Control Problems Akbar H. Borzabadi,

More information

SWITCHES ALLOCATION IN DISTRIBUTION NETWORK USING PARTICLE SWARM OPTIMIZATION BASED ON FUZZY EXPERT SYSTEM

SWITCHES ALLOCATION IN DISTRIBUTION NETWORK USING PARTICLE SWARM OPTIMIZATION BASED ON FUZZY EXPERT SYSTEM SWITCHES ALLOCATION IN DISTRIBUTION NETWORK USING PARTICLE SWARM OPTIMIZATION BASED ON FUZZY EXPERT SYSTEM Tiago Alencar UFMA tiagoalen@gmail.com Anselmo Rodrigues UFMA schaum.nyquist@gmail.com Maria da

More information

Feature Selection Algorithm with Discretization and PSO Search Methods for Continuous Attributes

Feature Selection Algorithm with Discretization and PSO Search Methods for Continuous Attributes Feature Selection Algorithm with Discretization and PSO Search Methods for Continuous Attributes Madhu.G 1, Rajinikanth.T.V 2, Govardhan.A 3 1 Dept of Information Technology, VNRVJIET, Hyderabad-90, INDIA,

More information

A *69>H>N6 #DJGC6A DG C<>C::G>C<,8>:C8:H /DA 'D 2:6G, ()-"&"3 -"(' ( +-" " " % '.+ % ' -0(+$,

A *69>H>N6 #DJGC6A DG C<>C::G>C<,8>:C8:H /DA 'D 2:6G, ()-&3 -(' ( +-   % '.+ % ' -0(+$, The structure is a very important aspect in neural network design, it is not only impossible to determine an optimal structure for a given problem, it is even impossible to prove that a given structure

More information

Solving Economic Load Dispatch Problems in Power Systems using Genetic Algorithm and Particle Swarm Optimization

Solving Economic Load Dispatch Problems in Power Systems using Genetic Algorithm and Particle Swarm Optimization Solving Economic Load Dispatch Problems in Power Systems using Genetic Algorithm and Particle Swarm Optimization Loveleen Kaur 1, Aashish Ranjan 2, S.Chatterji 3, and Amod Kumar 4 1 Asst. Professor, PEC

More information

Binary Differential Evolution Strategies

Binary Differential Evolution Strategies Binary Differential Evolution Strategies A.P. Engelbrecht, Member, IEEE G. Pampará Abstract Differential evolution has shown to be a very powerful, yet simple, population-based optimization approach. The

More information

SOFT COMPUTING TECHNIQUES FOR INTRUSION DETECTION. A Dissertation. Presented for the. Doctor of Philosophy. Degree. The University of Memphis

SOFT COMPUTING TECHNIQUES FOR INTRUSION DETECTION. A Dissertation. Presented for the. Doctor of Philosophy. Degree. The University of Memphis SOFT COMPUTING TECHNIQUES FOR INTRUSION DETECTION A Dissertation Presented for the Doctor of Philosophy Degree The University of Memphis Jonatan Gomez Perdomo August 2004 i Dedication This work is dedicated

More information

Self-learning Mobile Robot Navigation in Unknown Environment Using Evolutionary Learning

Self-learning Mobile Robot Navigation in Unknown Environment Using Evolutionary Learning Journal of Universal Computer Science, vol. 20, no. 10 (2014), 1459-1468 submitted: 30/10/13, accepted: 20/6/14, appeared: 1/10/14 J.UCS Self-learning Mobile Robot Navigation in Unknown Environment Using

More information

PARTICLE SWARM OPTIMIZATION (PSO) [1] is an

PARTICLE SWARM OPTIMIZATION (PSO) [1] is an Proceedings of International Joint Conference on Neural Netorks, Atlanta, Georgia, USA, June -9, 9 Netork-Structured Particle Sarm Optimizer Considering Neighborhood Relationships Haruna Matsushita and

More information

Particle Swarm Optimization Applied to Job Shop Scheduling

Particle Swarm Optimization Applied to Job Shop Scheduling NATIONAL INSTITUTE OF TECHNOLOGY, ROURKELA Submission of project report for the evaluation of the final year project Titled Particle Swarm Optimization Applied to Job Shop Scheduling Under the guidance

More information

A MULTI-SWARM PARTICLE SWARM OPTIMIZATION WITH LOCAL SEARCH ON MULTI-ROBOT SEARCH SYSTEM

A MULTI-SWARM PARTICLE SWARM OPTIMIZATION WITH LOCAL SEARCH ON MULTI-ROBOT SEARCH SYSTEM A MULTI-SWARM PARTICLE SWARM OPTIMIZATION WITH LOCAL SEARCH ON MULTI-ROBOT SEARCH SYSTEM BAHAREH NAKISA, MOHAMMAD NAIM RASTGOO, MOHAMMAD FAIDZUL NASRUDIN, MOHD ZAKREE AHMAD NAZRI Department of Computer

More information

SPIDeR. A Distributed Multi-Agent Intrusion Detection and Response Framework. Patrick Miller

SPIDeR. A Distributed Multi-Agent Intrusion Detection and Response Framework. Patrick Miller SPIDeR A Distributed Multi-Agent Intrusion Detection and Response Framework Patrick Miller patrick@spider.doriathproject.com Overview Goals Utilize new and existing sensors collaboratively to generate

More information

Particle Swarm Optimization Artificial Bee Colony Chain (PSOABCC): A Hybrid Meteahuristic Algorithm

Particle Swarm Optimization Artificial Bee Colony Chain (PSOABCC): A Hybrid Meteahuristic Algorithm Particle Swarm Optimization Artificial Bee Colony Chain (PSOABCC): A Hybrid Meteahuristic Algorithm Oğuz Altun Department of Computer Engineering Yildiz Technical University Istanbul, Turkey oaltun@yildiz.edu.tr

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013 ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013 ISSN 1 Review: Boosting Classifiers For Intrusion Detection Richa Rawat, Anurag Jain ABSTRACT Network and host intrusion detection systems monitor malicious activities and the management station is a technique

More information

1 Lab + Hwk 5: Particle Swarm Optimization

1 Lab + Hwk 5: Particle Swarm Optimization 1 Lab + Hwk 5: Particle Swarm Optimization This laboratory requires the following equipment: C programming tools (gcc, make). Webots simulation software. Webots User Guide Webots Reference Manual. The

More information

Witold Pedrycz. University of Alberta Edmonton, Alberta, Canada

Witold Pedrycz. University of Alberta Edmonton, Alberta, Canada 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC) Banff Center, Banff, Canada, October 5-8, 2017 Analysis of Optimization Algorithms in Automated Test Pattern Generation for Sequential

More information

[Kaur, 5(8): August 2018] ISSN DOI /zenodo Impact Factor

[Kaur, 5(8): August 2018] ISSN DOI /zenodo Impact Factor GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES EVOLUTIONARY METAHEURISTIC ALGORITHMS FOR FEATURE SELECTION: A SURVEY Sandeep Kaur *1 & Vinay Chopra 2 *1 Research Scholar, Computer Science and Engineering,

More information

Takagi-Sugeno Fuzzy System Accuracy Improvement with A Two Stage Tuning

Takagi-Sugeno Fuzzy System Accuracy Improvement with A Two Stage Tuning International Journal of Computing and Digital Systems ISSN (2210-142X) Int. J. Com. Dig. Sys. 4, No.4 (Oct-2015) Takagi-Sugeno Fuzzy System Accuracy Improvement with A Two Stage Tuning Hassan M. Elragal

More information

Hybrid Network Intrusion Detection for DoS Attacks

Hybrid Network Intrusion Detection for DoS Attacks I J C T A, 9(26) 2016, pp. 15-22 International Science Press Hybrid Network Intrusion Detection for DoS Attacks K. Pradeep Mohan Kumar 1 and M. Aramuthan 2 ABSTRACT The growing use of computer networks,

More information