期刊文献+

A Probability Approach to Anomaly Detection with Twin Support Vector Machines

A Probability Approach to Anomaly Detection with Twin Support Vector Machines
原文传递
导出
摘要 Classification of intrusion attacks and normal network flow is a critical and challenging issue in network security study. Many intelligent intrusion detection models are proposed, but their performances and efficiencies are not satisfied to real computer networks. This paper presents a novel effective intrusion detection system based on statistic reference model and twin support vector machines (TWSVMs). Moreover, a network flow feature selection procedure has been studied and implemented with TWSVMs. The performances of proposed system are evaluated through using the fifth international conference on knowledge discovery and data mining in 1999 (KDD'99) data set collected at MIT's Lincoln Labs and the results indicate that the proposed system is more efficient and effective than conventional support vector machines (SVMs) and TWSVMs. <Abstract>Classification of intrusion attacks and normal network flow is a critical and challenging issue in network security study. Many intelligent intrusion detection models are proposed, but their performances and efficiencies are not satisfied to real computer networks. This paper presents a novel effective intrusion detection system based on statistic reference model and twin support vector machines (TWSVMs). Moreover, a network flow feature selection procedure has been studied and implemented with TWSVMs. The performances of proposed system are evaluated through using the fifth international conference on knowledge discovery and data mining in 1999 (KDD’99) data set collected at MIT’s Lincoln Labs and the results indicate that the proposed system is more efficient and effective than conventional support vector machines (SVMs) and TWSVMs.
作者 聂巍 何迪
出处 《Journal of Shanghai Jiaotong university(Science)》 EI 2010年第4期385-391,共7页 上海交通大学学报(英文版)
基金 the National Natural Science Foundation of China (No. 60572157) the Scientific Research Foundation for the Returned Overseas Chinese Schol-ars, State Education Ministry
  • 相关文献

参考文献13

  • 1CUNNINGHAM a K, LIPPMANN a P, et al. Evaluating intrusion detection systems: The 1998 DARPA off- line intrusion detection evaluation [C]// Proceedings of the 2000 DARPA Information Survivability Con- ference and Exposition (DISCEX). Hilton Head South Carolina, USA: IEEE, 2000: 12-26.
  • 2SHUN J, MALKI n A. Network intrusion detection system using neural networks [C]//The Fourth International Conference on Natural Computation, 2008. Ji'nan Shandong, China: Local Organization Committee, 2008: 242-246.
  • 3SALVATORE S J, WEI F, WENKE L, et al. Cost-based modeling for fraud and intrusion detection: Results from the JAM project [C]//DARPA Information Survivability Conference and Exposition POOO(DISCEX '00). Hilton Head South Carolina, USA: IEEE, 2000: 130-144.
  • 4LEE J H, LEE J H, SOHN S G, et al. Effective value of decision tree with KDD'99 intrusion detection datasets for intrusion detection system [C]//The lOth International Conference on Advanced Communication Technology. Phoneix Park, Korea: Local Organization Committee, 2008: 1170-1175.
  • 5JAYADEVA, KHEMCHANDANI R, SURESH C. Twin support vector machines for pattern classification [J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2007, 29(5): 905-910.
  • 6ZHONG S, KHOSHGOFTAAR T M, SELIYA N. Clustering-based network intrusion detection [J]. International Journal of Reliability, Quality, and Safety Engineering, 2007, 14(2): 169-187.
  • 7ANDROULIDAKIS G, CHATZIGIANNAKIS V, GRAMMATIKOU M. Network flow-based anomaly detection of DoS attacks [C]// TERENA Networking Conference 2004. Rhodes, Greece: TERENA Conference Organization Committee, 2004: 7-10.
  • 8THOTTAN M, JI C Y. Anomaly detection in IP networks [J]. IEEE Transactions on Signal Processing, 2003, 51(8): 2191-2204.
  • 9DILLON R M, MANIKOPOULOS C N. Neural network nonlinear prediction for speech data [J]. IEEE Electronics Letters, 1991, 27(10): 824-826.
  • 10SONG S, LING L, MANIKOPOULO C N. Flow-based statistical aggregation schemes for network anomaly detection [C]//The 2006 IEEE International Conference on Networking, Sensing and Control. Lauderdale, USA: Local Organization Committee, 2006: 786-791.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部