期刊文献+

Less is More:Data Processing with SVM for Intrusion Detection

Less is More:Data Processing with SVM for Intrusion Detection
下载PDF
导出
摘要 To improve the detection rate and lower down the false positive rate in intrusion detection system, dimensionality reduction is widely used in the intrusion detection system. For this purpose, a data processing (DP) with support vector machine (SVM) was built. Different from traditiona/ly identifying the redundant data before purging the audit data by expert knowledge or utilizing different kinds of subsets of the available 41-connection attributes to build a classifier, the proposed strategy first removes the attributes whose correlation with another attribute exceeds a threshold, and then classifies two sequence samples as one class while removing either of the two samples whose similarity exceeds a threshold. The results of performance experiments showed that the strategy of DP and SVM is superior to the other existing data reduction strategies ( e. g. , audit reduction, rule extraction, and feature selection), and that the detection model based on DP and SVM outperforms those based on data mining, soft computing, and hierarchical principal component analysis neural networks. To improve the detection rate and lower down the false positive rate in intrusion detection system, dimensionality reduction is widely used in the intrusion detection system. For this purpose, a data processing (DP) with support vector machine (SVM) was built. Different from traditiona/ly identifying the redundant data before purging the audit data by expert knowledge or utilizing different kinds of subsets of the available 41-connection attributes to build a classifier, the proposed strategy first removes the attributes whose correlation with another attribute exceeds a threshold, and then classifies two sequence samples as one class while removing either of the two samples whose similarity exceeds a threshold. The results of performance experiments showed that the strategy of DP and SVM is superior to the other existing data reduction strategies ( e. g. , audit reduction, rule extraction, and feature selection), and that the detection model based on DP and SVM outperforms those based on data mining, soft computing, and hierarchical principal component analysis neural networks.
出处 《Journal of Southwest Jiaotong University(English Edition)》 2009年第1期9-15,共7页 西南交通大学学报(英文版)
基金 The National Natural Science Foundation ofChina (No.60672049)
关键词 Support vector machine Data processing Attribute selection SIMILARITY Support vector machine Data processing Attribute selection Similarity
  • 相关文献

参考文献11

  • 1Corinna Cortes,Vladimir Vapnik.Support-Vector Networks[J].Machine Learning.1995(3)
  • 2Khanna R,Liu H P.System approach to intrusion detec- tion using hidden Markov model[].WCMC.2006
  • 3Rezaul Karim A H M,Rajatheva R M A P,Ahmed K M.An efficient collaborative intrusion detection system for MANET using bayesian approach[].MSWiM.2006
  • 4Chimphlee W,Sap M N M,Abdullah A H,et al.To identify suspicious activity in anomaly detection based on soft computing[].Proceedings of the th IASTED In- ternational Mutli-Conference ARTIFIVAL INTELLI- GENCE and APPLICATIONS.2006
  • 5Rapaka A,Novokhodko A,Wunsch D.Intrusion detec- tion using radial basis function network on sequences of system calls[].Proceedings of the International Joint Conference on Neural Networks.2003
  • 6TheInformation Systems Technology Group ( IST) ofMIT Lincoln Laboratory,under Defense Advanced Re- search Projects Agency (DARPA).DARPA Intru- sion Detection Evaluation Data Sets. http://www.ll. mit.edu/IST/ideval/data/1998/1998-data-index.html . 1998
  • 7Fung G,Mangasarian O L.Proximal support vector machine classifiers[].Proceedings of KDD-: Knowledge Discovery and Data Mining.2001
  • 8Lee W,Stolfo S J,Mok K.A Data Mining Framework for Building Intrusion Detection Models[].Proceedings of the IEEE Symposium on Security and Privacy.1999
  • 9A.K. Ghosh,J. Wanken,and F. Charron.Detecting anomalous and unknown intrusions against programs[]..1998
  • 10Lippmann R,Haines J,Fried D,et al.Analysis and results of the1999DARPA Off-Line intrusion detection evaluation[].Computer Networks.2000

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部