Research on SVDD Network Intrusion Detection of the Optimal Feature Selection for Particle Swarm

Article Preview

Abstract:

Focusing on the problem about the higher dimensionality of sample set in the intrusion detection, propose an optimized method of support vector data description (SVDD) based on particle swarm optimization (PSO) and apply it to the intrusion detection of network exception. This method adopts PSO to eliminate the superfluous parameters in SVDD and carries out dimension reduction to data; then, establish the super sphere model to detect the network intrusion data and output the results of intrusion detection. Carry out the simulation experiment based on the standard detection data set of KDD CUP' 99, and the result shows that this method, comparing with the traditional SVDD, can effectively improve the detection ratio with a smaller amount of calculation.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

860-863

Citation:

Online since:

December 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Qing Sihan, Jiang Jianchun. Research overview of Intrusion Detection Technology[J]. Journal on Communications, 2004, 25(7): 9-29.

Google Scholar

[2] Ni Lin, Zheng Hongying. Feature Selection Based on the Immune Particle Swarm Algorithm[J]. Computer Application, 2007, 27(12): 2922-2924.

Google Scholar

[3] Gu Baoping, Xu Xiaoyuan, Guo Hongyan. Application of K-average Algorithm Based on Particle Swarm Optimization in the Network Intrusion Detection[J]. Computer Application, 2007, 27(6): 1368-1370.

Google Scholar

[4] Jia Weifeng, Li Jie, Tong Bin. Network Intrusion Detection Method Based on Semi-supervised Dimensionality Reduction Technique[J]. Computer Application and Software, 2013, 30(10): 133-135.

Google Scholar

[5] Zhou Zexun, Jiang Yun, Ming Lite, et al. Improved Intrusion Detection Method Based on Kernel Learning[J]. Computer Engineering, 2012, 38 (14): 21-25.

Google Scholar