Intrusion Detection Method Based on Support Vector Machine with Pre-Extracting Support Vector

Article Preview

Abstract:

Intrusion detection algorithm based on support vector machine with pre-extracting support vector is proposed which combines the center distance ratio and classification algorithm. Given proper thresholds, we can use the support vector as a substitute for the training examples. Then the scale of dataset is decreased and the performance of support vector machine is improved in the detection rate and the training time. The experiment result has shown that the IDS based on support vector machine with pre-extracting support needs less training time under the same detection performance condition.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

373-377

Citation:

Online since:

April 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Forrest S, Perrelason AS, Allen L, Cherukur: Self_Nonself discrimination in a computer . In: Rushby J, Meadows C, eds. Proceedings of the 1994 IEEE, pp.137-140

Google Scholar

[2] Kim J, Bentley: Towards an artificial immune system for network intrusion detection an investigation of clonal selection with a negative selection operator. Proc Congress on Evolutionary Computation, Seoul, Korea, 2001, pp.27-30

DOI: 10.1109/cec.2001.934333

Google Scholar

[3] W.Lee, S.J. Stolofo: Data mining approaches for intrusion detection . In Proceedings of the 7th USENIX Security Symposium, San Antonio, 2009. pp.361-364

Google Scholar

[4] FUGATE M, GATTIKER J R : Intrusion detection algorithm based on support vector machine. Software journal (CHINA), 14(4)( 2003), pp.798-803

Google Scholar

[5] YU Sheng-chen: Solution to Feature Compression of Intrusion Detection System In Controllable and Trustednet Works. International Conference on Information Technology an Environmental System Sciences(ITESS'2008), 2008, pp.704-710.

Google Scholar

[6] YU Sheng-chen: Solution to Feature Compression of Intrusion Detection System In Controllable and Trustednet Works. International Conference on Information Technology an Environmental System Sciences(ITESS'2008), 2008, pp.704-710.

Google Scholar

[7] YU Sheng-chen: Method for Getting Inter-Independent Features Used to Intrusion Detection System In Controllable and Trusted Networks . GCIS 2009. pp.461-465

DOI: 10.1109/gcis.2009.393

Google Scholar