期刊文献+

KFDA and clustering based multiclass SVM for intrusion detection 被引量:4

KFDA and clustering based multiclass SVM for intrusion detection
原文传递
导出
摘要 To improve the classification accuracy and reduce the training time, an intrusion detection technology is proposed, which combines feature extraction technology and multiclass support vector machine (SVM) classification algorithm. The intrusion detection model setup has two phases. The first phase is to project the original training data into kernel fisher discriminant analysis (KFDA) space. The second phase is to use fuzzy clustering technology to cluster the projected data and construct the decision tree, based on the clustering results. The overall detection model is set up based on the decision tree. Results of the experiment using knowledge discovery and data mining (KDD) from 99 datasets demonstrate that the proposed technology can be an an effective way for intrusion detection. To improve the classification accuracy and reduce the training time, an intrusion detection technology is proposed, which combines feature extraction technology and multiclass support vector machine (SVM) classification algorithm. The intrusion detection model setup has two phases. The first phase is to project the original training data into kernel fisher discriminant analysis (KFDA) space. The second phase is to use fuzzy clustering technology to cluster the projected data and construct the decision tree, based on the clustering results. The overall detection model is set up based on the decision tree. Results of the experiment using knowledge discovery and data mining (KDD) from 99 datasets demonstrate that the proposed technology can be an an effective way for intrusion detection.
出处 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2008年第1期123-128,共6页 中国邮电高校学报(英文版)
基金 the National Natural Science Foundation of China(60772109).
关键词 intrusion detection kernel fisher discriminant analysis fuzzy clustering support vector machine intrusion detection, kernel fisher discriminant analysis, fuzzy clustering, support vector machine
  • 相关文献

参考文献19

  • 1Ludovic M. Genetic algorithm, a biologically inspired approach for security audit trails analysis. Proceedings of 12th International Conference on Computer Safety, Reliability and Security (SAFECOMP'93), Oct 27-29, 1993, Poznan, Poland. Berlin, Germany: Springer-Verlag, 1993
  • 2Ryan J, Lin M J. Intrusion detection with neural networks. Advances in Neural Information Processing Systems 10,Cambridge, MA, USA: MIT Press, 1998
  • 3Batur C, Zhou L, Chan C C. Support vector machines for fault detection. Proceedings of the 41st IEEE Conference on Detection and Control: Vol 2, Dec 10--13, Las Vegas, NV, USA, Piscataway, NJ, USA: IEEE, 2002:1355-1356
  • 4Tian Xin-guang, Gao Li-zhi, Sun Chun-lai, et al. A method for anomaly detection of user behaviors based on machine learning. The Journal of China Universities of Posts and Telecommunications, 2006,13(2): 61--65
  • 5Liu Yi-hung, Chen Yen-ting. Face recognition using total margin-based adaptive fuzzy support vector machines. IEEE Transactions on Neural Networks, 2007,18(1): 178-192
  • 6Lin Chun-fu, Wang Sheng-de. Fuzzy support vector machine. IEEE Transactions on Neural Networks, 2002,13(2): 464-471
  • 7Xiong Sheng-wu, Liu Hong-bing, Niu Xiao-xiao. Fuzzy support vector machines based on FCM clustering. Proceedings of the Fourth International Conference on Machine Learning and Cybernetics, Guangzhou, China, Aug 18-21, 2005. Piscataway, NJ, USA: IEEE, 2005:2608-2613
  • 8Sung A H, Mukkamala S. Identify important features lor intrusion detection using support vector machines and neural networks. Proceedings of 2003 Symposium on Applications and the Internet, Jan 27-31, 2003, Orlando, FL, USA. Piscataway, N J, USA: IEEE Computer Society, 2003:209-217
  • 9Middlemiss M J, Dick G. Weighted feature extraction using a genetic algorithm for intrusion detection. Conqress on Evolutionary Computation: Vol 3, Dec 8-12, Carberra, Australia. Piscataway, NJ, USA: IEEE, 2003:1669--1675
  • 10Shon T, Kim Y, Lee C, Moon J, et al. A machine learning framework for network anomaly detection using svm and ga. Proceedings of 6th Annual IEEE Workshop on Information Assurance and Security, Jun 15-17, 2005, West Point, NY, USA. Piscataway, NJ, USAS: IEEE Computer Society, 2005:176--183

同被引文献35

  • 1陈才扣,杨静宇,杨健.一种融合PCA和KFDA的人脸识别方法[J].控制与决策,2004,19(10):1147-1150. 被引量:5
  • 2林茂六,陈春雨.基于傅立叶核与径向基核的支持向量机性能之比较[J].重庆邮电学院学报(自然科学版),2005,17(6):647-650. 被引量:11
  • 3苏高利,邓芳萍.关于支持向量回归机的模型选择[J].科技通报,2006,22(2):154-158. 被引量:59
  • 4BAJCSY R, KESIDIS G, LEVITT K, et al. Cyber Defense Technology Networking and Evaluation [ J]. Communications of the ACM, 2004, 47 (3) : 58-61.
  • 5ALGIRDAS A, JEAN-CLAUDE L, BRIAN R, et al. Basic Concepts and Taxonomy of Dependable and Secure Computing [J]. IEEE Transactions on Dependable and Secure Computing, 2004, 1 (1) : 11-33.
  • 6SZYMANSKI B K, ZHANG Y Q. Recursive Data Mining for Masquerade Detection and Author Identification [ C ] //Proceedings of the 5th IEEE System, Man and Cybernetics Information Assurance Workshop. NY: [ s. n. ], 2004: 424-431.
  • 7VAPNIK Vladimir N.The Nature of Statistical Learning Theory[M].New York,USA:Springer Verlag,1995.
  • 8JIANG Minghui,YUAN Xuchuan.Personal Credit Scoring Model Based on SVM Optimized by GA[C] // Control Conference 2007.China Hunan:IEEE Press,2007:731-735.
  • 9YAN X F,CHEN D Z,HU S X.Chaos-genetic Algorithms for Optimizing the Operating Conditions Based on RBF-PLS Model[J].Computers and chemical engineering,2003,27(12):1393-1404.
  • 10YAN X F,DU W L,QIAN F.Development of a Kinetic Model for Industrial Oxidation of p-Xylene by RBF-PLS and CGA[J].AICHE journal,2004,50(6):1169-1176.

引证文献4

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部