期刊文献+

Hybrid Optimization of Support Vector Machine for Intrusion Detection

Hybrid Optimization of Support Vector Machine for Intrusion Detection
下载PDF
导出
摘要 Support vector machine (SVM) technique has recently become a research focus in intrusion detection field for its better generalization performance when given less priori knowledge than other soft-computing techniques. But the randomicity of parameter selection in its implement often prevents it achieving expected performance. By utilizing genetic algorithm (GA) to optimize the parameters in data preprocessing and the training model of SVM simultaneously, a hybrid optimization algorithm is proposed in the paper to address this problem. The experimental results demonstrate that it’s an effective method and can improve the performance of SVM-based intrusion detection system further. Support vector machine (SVM) technique has recently become a research focus in intrusion detection field for its better generalization performance when given less priori knowledge than other soft-computing techniques. But the randomicity of parameter selection in its implement often prevents it achieving expected performance. By utilizing genetic algorithm (GA) to optimize the parameters in data preprocessing and the training model of SVM simultaneously, a hybrid optimization algorithm is proposed in the paper to address this problem. The experimental results demonstrate that it's an effective method and can improve the performance of SVM-based intrusion detection system further.
出处 《Journal of Donghua University(English Edition)》 EI CAS 2005年第3期51-56,共6页 东华大学学报(英文版)
基金 This work was supported by the Research Grant of SEC E-Institute :Shanghai High Institution Grid and the Science Foundation ofShanghai Municipal Commission of Science and Technology No.00JC14052
关键词 支持向量机 组合最优化 入侵检测系统 遗传算法 系统调用踪迹 连续最小最优化 intrusion detection system ( IDS) , support vector machine ( SVM) , genetic algorithm ( GA ) , system call trace, ξα-estimator , sequential minimal optimization(SMO)
  • 相关文献

参考文献2

  • 1Zhen Liu,Susan M.Bridges , and Rayford B[]..2003
  • 2Lunt T. F.Comput[].Security.1993

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部