Integration of Fuzzy with Incremental Import Vector Machine for Intrusion Detection


  • Arun Kumar Ramamoorthy Anna University, Chennai, India
  • K. Karuppasamy RVS College of Engineering and Technology, Coimbatore, India



Adversarial attacks, IDS, global optima, Network anomaly discovery and Intrusion detection


IDM design and implementation remain a difficult undertaking and an unsolved research topic. Multi-dimensional irrelevant characteristics and duplicate information are included in the network dataset. To boost the effectiveness of IDM, a novel hybrid model is developed that combines Fuzzy Genetic Algorithms with Increment Import Vector Machines (FGA-I2VM), which works with huge amounts of both normal and aberrant network data with high detecting accuracy and low false alarm rates. The algorithms chosen for IDM in this stage are machine learning algorithms, which learn, find, and adapt patterns to changing situations over time. Pre-processing is the most essential stage in any IDM, and feature selection is utilized for pre-processing, which is the act of picking a collection or subset of relevant features for the purpose of creating a solution model. Information Gain (IG) is utilized in this FGA-I2VM model to pick features from the dataset for I2VM classification. To train the I2VM classifier, FGA uses three sets of operations to produce a new set of inhabitants with distinct patterns: cross over operation, selection, and finally mutation. The new population is then put into the Import Vector Machine, a strong classifier that has been used to solve a wide range of pattern recognition issues. FGA are quick, especially considering their capacity to discover global optima. Another advantage of FGA is their naturally parallel nature of assessing the individuals within a population. As a classifier, I2VM has self-tuning properties that allow patterns to attain global optimums. The FGA-efficacy I2VM model’s is complemented by information gain, which improves speed and detection accuracy while having a low computing cost


[1] Al Shahrani, B. M. M. (2021). Classification of Cyber-Attack using Adaboost Regression Classifier and Securing the Network, Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(10), 1215-1223.

[2] Sallam, A. A., Kabir, M. N., Alginahi, Y. M., Jamal, A., and Esmeel, T. K. (2020). IDS for Improving DDoS Attack Recognition Based on Attack Profiles and Network Traffic Features, In 16th IEEE International Colloquium on Signal Processing and Its Applications (CSPA), IEEE, (pp. 255-260).

[3] Mazini, M., Shirazi, B., and Mahdavi, I. (2019). Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms, Journal of King Saud University-Computer and Information Sciences, 31(4), 541-553.

[4] Yulianto, A., Sukarno, P., and Suwastika, N. A. (2019). Improving adaboost-based intrusion detection system (IDS) performance on CIC IDS 2017 dataset, In Journal of Physics: Conference Series,IOP Publishing, Vol. 1192, No. 1, p. 01201.

[5] Mikhail, J. W., Fossaceca, J. M., and Iammartino, R. (2019). A semi-boosted nested model with sensitivity-based weighted binarization for multidomain network intrusion detection, ACM Transactions on Intelligent Systems and Technology, 10(3).

[6] Akashdeep, I., Manzoor I., and Kumar, N. (2017). A feature reduced intrusion detection system using ANN classifier, Expert Systems with Applications, 88, 249-257.

[7] Li, K., Zhou, G., Zhai, J., Li, F., and Shao, M. (2019). Improved PSO_AdaBoost ensemble algorithm for imbalanced data, Sensors (Switzerland), 19(6).

[8] Shahraki, A., Abbasi, M., and Haugen, í˜. (2020). Boosting algorithms for network intrusion detection: A comparative evaluation of Real AdaBoost, Gentle AdaBoost and Modest AdaBoost, Engineering Applications of Artificial Intelligence, 94, 103770.

[9] Han, K., Wang, Y., Zhang, C., Li, C. and Xu, C. , (2018). Autoencoder inspired unsupervised feature selection, In Proceedings of the 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP),IEEE, pp. 2941-2945.

[10] Wang, C., Zheng, J., and Li, X., (2017). Research on DDOS attacks detection based on RDF- SVM, In Proceedings of the 2017 10th International Conference on Intelligent Computation Technology and Automation (ICICTA),IEEE, pp. 161-165.

[11] Revathy, G., Kumar, P. S., and Rajendran, V. (2021). Development of IDS using mining and machine learning techniques to estimate DoS malware, In International Journal of Computational Science and Engineering, 24(3), 259-275.

[12] Jianjian, D., Yang, T., and Feiyue, Y. (2018). A novel intrusion detection system based on IABRBFSVM for wireless sensor networks, In Procedia computer science, 131, 1113-1121.

Additional Files



Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.