Abstract
The soft computing methods play a vital role in identifying the malicious activities in the social network. The low cost solutions and the robustness provided by the soft computing in the identifying the unwanted activities make it a predominant area of research. The paper combines the soft computing techniques and frames an enhanced soft computing approach to detect the intrusion that cause security issues in the social network. The proffered method of the paper employs the enhanced soft computing technique that combines the fuzzy logic, decision tree, K means -EM and the machine learning in preprocessing, feature reduction, clustering and classification respectively to develop a security approach that is more effective than the traditional computations in identifying the misuse in the social networks. The intrusion detection system developed using the soft computing approach is tested using the KDD-NSL and the DARPA dataset to note down the security percentage, time utilization, cost and compared with the other traditional methods.
References
- Langin, Chet, and Shahram Rahimi. "Soft computing in intrusion detection: the state of the art." Journal of Ambient Intelligence and Humanized Computing 1, no. 2 (2010): 133-145.
- Singh, Raman, Harish Kumar, and R. Singla. "Review of soft computing in malware detection." Special issues on IP Multimedia Communications 1, no. 1 (2011): 55-60.
- Ahmad, Iftikhar, Azween Abdullah, Abdullah Alghamdi, and Muhammad Hussain. "Optimized intrusion detection mechanism using soft computing techniques." Telecommunication Systems 52, no. 4 (2013): 2187-2195.
- Jadhav, R. J., and U. T. Pawar. "Data mining for intrusion detection." International Journal of Power Control Signal and Computation 1, no. 4 (2005): 45-48.
- Shamshirband, Shahaboddin, Nor Badrul Anuar, Miss Laiha Mat Kiah, Vala Ali Rohani, Dalibor Petković, Sanjay Misra, and Abdul Nasir Khan. "Co-FAIS: cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks." Journal of Network and Computer Applications 42 (2014): 102-117.
- Panda, Mrutyunjaya, Ajith Abraham, and Manas Ranjan Patra. "A hybrid intelligent approach for network intrusion detection." Procedia Engineering 30 (2012): 1-9.
- Dash, Tirtharaj. "A study on intrusion detection using neural networks trained with evolutionary algorithms." Soft Computing 21, no. 10 (2017): 2687-2700.
- Sanyal, Sugata, and Manoj Rameshchandra Thakur. "A Hybrid Approach towards Intrusion Detection Based on Artificial Immune System and Soft Computing." arXiv preprint arXiv:1205.4457 (2012).
- Butun, Ismail, Salvatore D. Morgera, and Ravi Sankar. "A survey of intrusion detection systems in wireless sensor networks." IEEE communications surveys & tutorials 16, no. 1 (2013): 266-282.
- Sharma, Ruby, and Sandeep Chaurasia. "An enhanced approach to fuzzy C-means clustering for anomaly detection." In Proceedings of First International Conference on Smart System, Innovations and Computing, pp. 623-636. Springer, Singapore, 2018.
- Kumar, Koushal, and Simranjit Singh. "Intrusion Detection Using Soft Computing Techniques." (2016).
- Sangve, Sunil M., and Uday V. Kulkarni. "Anomaly based improved network intrusion detection system using clustering techniques." International Journal of Advanced Research in Computer Science 8, no. 7 (2017).
- Anguraj, Dinesh Kumar, and S. Smys. "Trust-based intrusion detection and clustering approach for wireless body area networks." Wireless Personal Communications 104, no. 1 (2019): 1-20
