A SVM Intrusion Detection Method Based on GPU

Article Preview

Abstract:

To optimize training procedure of IDS based on SVM and reduce time consumption, a SVM intrusion detection method based on GPU is proposed in the study. During the simulation experiments with KDD Cup 1999 data, GPU-based parallel computing model is adopted. Results of the simulation experiments demonstrate that time consumption in the training procedure of IDS is reduced, and performance of IDS is kept as usual.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

606-610

Citation:

Online since:

August 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Yong-Xiang Xia, Zhi-Hua Hu, Zhi-Cai Shi, a Framework for Distributed Incremental Intrusion Detection Based on SVM. PACIIA 2009, November 28-29, 2009 Wuhan, China.

DOI: 10.1109/paciia.2009.5406583

Google Scholar

[2] KDD Cup 1999 Data, Available on: http: /kdd. ics. uci. edu/databases/ kddcup99/kddcup99. html, August (2003).

Google Scholar

[3] M.A. Aydın, A.H. Zaim, K.G. Ceylan, A hybrid intrusion detection system design for computer network security. Computers & Electrical Engineering, 2009. 35(3): 517-526.

DOI: 10.1016/j.compeleceng.2008.12.005

Google Scholar

[4] P. Ning, S. Jajodia, X.S. Want, Design and implementation of a decentralized prototype system for detecting distributed attacks. Computer Communications, 2002(25): 1374-91.

DOI: 10.1016/s0140-3664(02)00039-7

Google Scholar

[5] V.N. Vapnik, The nature of statistical learning theory. 1995, New York: Springer.

Google Scholar

[6] E. Avci, A new intelligent diagnosis system for the heart valve diseases by using genetic-SVM classifier. Expert Systems with Applications, 2009. 36(7): 10618-10626.

DOI: 10.1016/j.eswa.2009.02.053

Google Scholar

[7] J. Yu, H. Lee, M. -S. Kim, D. Park, Traffic flooding attack detection with SNMP MIB using SVM. Computer Communications, 2008. 31(17): 4212-4219.

DOI: 10.1016/j.comcom.2008.09.018

Google Scholar

[8] C.J.C. Burges, A tutorial on support vector machines for pattern recognition. Data Mining and Knowledge Discovery, 1998(2): 1-47.

Google Scholar

[9] Yong-Xiang Xia, Zhi-Cai Shi, Zhi-Hua Hu, an Incremental SVM for Intrusion Detection Based on Key Feature Selection. IITA 2009, November 21-22, 2009 Nanchang, China.

DOI: 10.1109/paciia.2009.5406583

Google Scholar

[10] M. Martin, On-line Support Vector Machines for function approximation, Techn. report, Universitat Polit_ecnica de Catalunya, Departament de Llengatges i Sistemes Inform_atics, (2002).

Google Scholar

[11] Chih-Chung Chang, Chih-Jen Lin, LIBSVM: a Library for Support Vector Machines, http: /www. csie. ntu. edu. tw/~cjlin/libsvm/, (2010).

Google Scholar

[12] NVIDIA Corporation, NVIDIA CUDA Programming Guide, Version 3. 2, http: /developer. download. nvidia. com/compute/cuda/3_2/toolkit/ docs/CUDA_C_Programming_ Guide. pdf, (2009).

DOI: 10.2172/1532687

Google Scholar