A Hybrid Particle Swarm Optimization and C4.5 for Network Intrusion Detection and Prevention System


  • K.Nandha Kumar
  • D. Udaya Suriya Rajkumar
  • G. Viswanath
  • J. Mahalakshmi




Intrusion Detection System, Intrusion Prevention System, Particle Swarm Optimization, Detection Rate


Network Intrusion Detection and Prevention systems (NIDPS) ensure network security and used to effectively detect various attacks and completely stop them from intruding over a network. Since, securing sensitive information carried by various organizations is much more significant, developing enhanced security models become inevitable. To meet the growing demand in safeguarding the network from various known and unknown attacks. In this paper, a Hybrid Particle Swarm Optimization and C4.5 (HPSOCM) method is proposed to network based intrusion prevention system to detect unknown attacks and a signature based SNORT method to detect the known attacks in NIDS. In the hybrid method, we use data mining approach to mine the unknown attacks. Hence, we develop an anomalous detection model and train it using the data mining rules. The trained network is capable of detecting various unknown attacks. The conventional signature based SNORT method detects the known attacks by matching the detected threats from the KDD99 dataset. The proposed HPSOCM method is demonstrated using simulation and the performances were evaluated in terms of Accuracy, Specificity, Detection Rate and False Alarm Rate. The proposed method had produced better efficiency compared to various other existing methods.


Y. Uhm and W. Pak, “Real time network intrusion prevention system using incremental future generation,” Computers Materials &Continua, vol.70, issue 1, pp.1631-1648, 2022.https://doi.org/10.32604/cmc.2022.019667.

A. H. Farooqi and F. A. Khan, “Intrusion detection systems for wireless sensor networks: A survey,” Proceedings of the International Conference on Future Generation and Communication Networking FGCN’2019, CCIS, 2019, volume 56, pp. 234-241.https://doi.org/10.1007/978-3-642-10844-0_29.

A. Ghosal and S. Halder, “Intrusion detection in wireless sensor networks: Issues, challenges and approaches,” Wireless Networks and Security, vol.10 (1007), pp. 329-367, 2013. https://doi.org/10.1007/978-3-642-36169-2_10.

I.Butun,S. D. Morgera and R. Sankar, “A survey of intrusion detection systems in wireless sensor networks,” IEEE Communications Surveys and Tutorials, vol. 16, issue 1, pp. 266–282, 2013.https://doi.org/10.1109/SURV.2013.050113.00191.

Y. Maleh, A. Ezzati, Y.Qasmaoui and M. Mbida, “A global hybrid intrusion detection system for wireless sensor networks,”Procedia Computer Science, vol.52, issue 10, pp.1047-1052, 2015.https://doi.org/10.1016/j.procs.2015.05.108.

S. T. Bakhsh, S. Alghamdi, R. A.Alsemmeari and S. R. Hassan, “An adaptive intrusion detection and prevention system for Internet of Things,” International Journal of Distributed Sensor Networks, vol. 15, issue 11, pp.1-9, 2019.https://doi.org/10.1177/1550147719888109.

B. B.Zarpelão, R. S. Miani and S. C. de Alvarenga, “A survey of intrusion detection in Internet of Things,”Journal of Network and Computer Applications, vol. 84, issue 10, pp. 25–37, 2017.https://doi.org/10.1016/j.jnca.2017.02.009.

A. Ghosal and S. Halder, “A survey on energy efficient intrusion detection in wireless sensor networks,”Journal of Ambient Intelligence and Smart Environments, vol. 9, issue 2, pp. 239–261, 2017.https://doi.org/10.3233/AIS-170426.

X. Xiao and R. Zhang, “Study of immune-based intrusion detection technology in wireless sensor networks,”Arabian Journal for Science and Engineering, vol. 42, issue 8, pp. 3159–3174, 2017. https://doi.org/10.1007/s13369-017-2426-1.

W. Guo, Y. Chen, Y. Cai, T. Wang and H. Tian, “Intrusion detection in WSN with an improved NSA based on the DE-CMOP,”KSII Transactions on Internet and Information Systems, vol. 11, issue 11, pp. 5574-5591, 2017.https://doi.org/10.3837/tiis.2017.11.022.

G. Creech and J. Hu, “A semantic approach to host-based intrusion detection systems using contiguous and discontiguous system call patterns,”IEEE Transactions on Computers, vol.63, issue 4, pp. 807–819, 2014.https://doi.org/10.1109/TC.2013.13.

S. Aljawarneh, M. Aldwairi and M. B.Yassein, “Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model,” Journal of Computational Science, vol. 25, issue 10, pp. 152–160, 2018.https://doi.org/10.1016/j.jocs.2017.03.006.

V. Kelli, V. Argyriou, and T.Lagkas, “IDS for industrial applications: A federated learning approach with active personalization,”Sensors, vol.21, issue 20, pp. 1-17, 2021.https://doi.org/10.3390/s21206743.

I. Almomani, B. Al-Kasasbeh and M. Al-Akhras, “WSN-DS: A dataset for intrusion detection systems in wireless sensor networks,” Journal of Sensors, Article Id. 4731953, pp.1-15, 2016.https://doi.org/10.1155/2016/4731953.

S.Otoum, B.Kantarci, H. T Mouftah, “On the feasibility of deep learning in sensor network intrusion detection,”IEEE Networking Letters, vol.1, issue 2,pp. 68–71, 2019.https://doi.org/10.1109/LNET.2019.2901792.

Md. E. Haque and T. M. Alkharobi, “Adaptive hybrid model for network intrusion detection and comparison among machine learning algorithms,” International Journal of Machine Learning and Computing, vol. 5, issue 1, pp. 17-23, 2015.https://doi.org/10.7763/IJMLC.2015.V5.476.

R. Zhang and X. Xiao, “Intrusion detection system in wireless sensor networks with an improved NSA based on space division,” Journal of Sensors, vol.10, no. 1155, pp.1-21, 2019.https://doi.org/10.1155/2019/5451263.

I. Butun, S. D. Morgera, and R. Sankar, “A survey of intrusion detection systems in wireless sensor networks,”IEEE Communications Surveys & Tutorials, vol. 16, issue 1, pp. 266–282, 2014.https://doi.org/10.1109/SURV.2013.050113.00191.

U. S. R. Dhamodharan et al., “A centralized mechanism for preventing DDOS attack in wireless sensor networks,”Wireless Personal Communication, vol.10, no. 1007, pp.1-18,2021.

U. S. R. Dhamodharan et al., “Artificial bee colony method for identifying eavesdropper in terrestrial cellular networks,”Transaction on Emerging and Telecommunications Technologies, vol.32, issue 7, pp.1-17, 2019.https://doi.org/10.1002/ett.3941

A. Abduvaliyev, A. S. K. Pathan, J. Zhou, R. Roman, and W.-C. Wong, “On the vital areas of intrusion detection systems in wireless sensor networks,”IEEE Communications Surveys & Tutorials, vol. 15, issue 3, pp. 1223–1237, 2013.

E. Gyamfi and A. Jurcut, “Intrusion detection in Internet of Things: A review on design approaches leveraging multi-access edge computing, machine learning, and datasets,” Sensors, vol. 22, issue 3744, pp. 01–33, 2022. https://doi.org.10.3390/s22103744.

U. S. R. Dhamodharan, P. Shanmugaraja, K. Arunkumar, R. Sathiyaraj and P. Manivannan, “A HSEERP – Hierarchical secured energy efficient routing protocol for wireless sensor network,” Peer-to-Peer Networking and Applications, vol. 17, issue 1007, pp. 163-175, 2024. https://doi.org/10.1007/s12083-023-01575-w.

C. E. Loo, M. Y. Ng and M.Palaniswami, “Intrusion detection for routing attacks in sensor networks,”International Journal of Distributed Sensor Networks, vol. 2, issue 4, pp.313-332, 2006.https://doi.org/10.1080/15501320600692044.

S. Misra, V. Krishna, and K. I. Abraham, “A simple learning automata-based solution for intrusion detection in wireless sensor networks,”Wireless Communications and Mobile Computing, vol. 11, issue 3, pp.426-441,2011.https://doi.org/10.1002/wcm.946.




How to Cite

Kumar, K., Udaya Suriya Rajkumar, D., Viswanath, G., & Mahalakshmi, J. (2024). A Hybrid Particle Swarm Optimization and C4.5 for Network Intrusion Detection and Prevention System. International Journal of Computing, 23(1), 109-115. https://doi.org/10.47839/ijc.23.1.3442