hanced models perform better with the BBAL subset.
The attack detection rate for PSO-SVM with the BBA
subset is comparable with the standard BBAL-SVM.
Table 5 reveals PSO-SVM and BA-SVM, with the
BBAL subset, offer an improvement of almost 1.8%
for the false alarm rate and no more than 3.8% for the
attack detection rate. Results from Table 4 show the
false alarm rate is lightly significantly lower, while
the attack detection rate gains approximately 2.5%.
On the other hand, the accuracy for unknown attacks
is upgraded with almost 10% in all cases. This means
that our new classifier is able to raise proper alarms.
We must also remark that the difference between the
results given by PSO and BA is quite small. Further-
more, for known attacks, all approaches show good
accuracy results and the best is obtained by the BA-
SVM (99.31%).
4 CONCLUSIONS
In this paper we proposed a new NIDS model that
combines SVM with a recent swarm intelligence al-
gorithm, the Bat Algorithm. The main contribution
of this paper is the novel feature selection method
(BBAL) that succeeds to reduce the number of at-
tributes from the dataset while improving the predic-
tive accuracy, detection rate and false alarm rate of the
SVM classifier. To evaluate the effectiveness of the
proposed model we use the NSL-KDD network intru-
sion benchmark and compare it with the popular PSO
for our two subset of features. We showed that BBAL
can upgrade BBA for feature selection but, only when
combined with SVM. Therefore, our future work will
focus on combining BBAL with other classifiers and
comparing it to other feature selection approaches in
order to range its quality.
ACKNOWLEDGEMENTS
The work has been funded by the Sectoral Operational
Programme Human Resources Development 2007-
2013 of the Ministry of European Funds through the
Financial Agreement POSDRU/159/1.5/S/132395.
REFERENCES
Dua, S. and Du, X. (2011a). Classical machine-learning
paradigmsfor data mining. In Data Mining and Ma-
chine Learning in Cybersecurity, pages 23–56. Auer-
bach Publications Taylor and Francis Group.
Dua, S. and Du, X. (2011b). Machine learning for anomaly
detection. In Data Mining and Machine Learning in
Cybersecurity, pages 85–114. Auerbach Publications
Taylor and Francis Group.
Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann,
P., and Witten, I. H. (2009). The weka data mining
software: an update. SIGKDD Explor. Newsl., 11:10–
18.
Kukielka, P. and Kotulski, Z. (2014). New unknown attack
detection with the neural network-based ids. In The
State of the Art in Intrusion Prevention and Detection,
pages 259–284. Auerbach Publications.
Mirjalili, S., Mirjalili, S., and Yang, X.-S. (2013). Binary
bat algorithm. Neural Computing and Applications,
pages 1–19.
Pu, J., Xiao, L., Li, Y., and Dong, X. (2012). A detec-
tion method of network intrusion based on svm and
ant colony algorithm. In Proceedings of the National
Conference on Information Technology and Computer
Science, pages 153–156. Atlantis Press.
Tavallaee, M., Bagheri, E., Lu, W., and Ghorbani, A. A.
(2009). A detailed analysis of the KDD CUP 99 data
set. In Proceedings of the IEEE Symposium on Com-
putational Intelligence in Security and Defense Appli-
cations, pages 1–6. IEEE.
Wang, J., Hong, X., and R. Ren, T. L. (2009). A real-
time intrusion detection system based on pso-svm.
In Proceedings of the International Workshop on In-
formation Security and Application, pages 319–321.
ACADEMY PUBLISHER.
Wang, J., Li, T., and Ren, R. (2010). A real time IDSs
based on artificial bee colony-support vector machine
algorithm. In Proceedings in the International Work-
shop on Advanced Computational Intelligence, pages
91–96. IEEE.
Xie, J., Zhou, Y., and Chen, H. (2013). A novel bat algo-
rithm based on differential operator and l´evy flights
trajectory. Computational Intelligence and Neuro-
science, 2013.
Yang, X.-S. (2009). Firefly algorithm, l´evy flights and
global optimization. In Proceedings of the SGAI Inter-
national Conference on Artificial Intelligence, pages
209–218.
Yang, X.-S. (2010a). A new metaheuristic bat-inspired
algorithm. In Nature Inspired Cooperative Strate-
gies for Optimization (NICSO 2010), volume 284 of
Studies in Computational Intelligence, pages 65–74.
Springer Berlin Heidelberg.
Yang, X.-S. (2010b). Random walks and l´evy flights.
In Nature-Inspired Metaheuristic Algorithms Second
Edition, pages 11–20. Luniver Press.
Yang, X.-S. (2012). Swarm-based metaheuristic algorithms
and no-free-lunch theorems. In Theory and New Ap-
plications of Swarm Intelligence. InTech.
Yang, X.-S. and Deb, S. (2009). Cuckoo search via l´evy
flights. In Proceedings of the World Congress on Na-
ture & Biologically Inspired Computing, pages 210–
214. IEEE.
Yang, X.-S. and He, X. (2013). Bat algorithm: Literature
review and applications. International Journal of Bio-
Inspired Computation, 5(3):141–149.
EnhancedIntrusionDetectionSystemBasedonBatAlgorithm-supportVectorMachine
189