A Wavelet Kernel-Based Support Vector Machine for Communication Network Intrusion Detection

Article Preview

Abstract:

This study is to propose a wavelet kernel-based support vector machine (SVM) for communication network intrusion detection. The common intrusion types of communication network mainly include DOS, R2L, U2R and Probing. SVM, BP neural network are used to compare with the proposed wavelet kernel-based SVM method to show the superiority of wavelet kernel-based SVM. The detection accuracy for communication network intrusion of wavelet kernel-based SVM is 96.67 %, the detection accuracy for communication network intrusion of SVM is 90.83%, and the detection accuracy for communication network intrusion of BP neural network is 86.67%.It can be seen that the detection accuracy for communication network intrusion of wavelet kernel-based SVM is better than that of SVM or BP neural network.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 989-994)

Pages:

4474-4477

Citation:

Online since:

July 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Chenfeng Vincent Zhou, Christopher Leckie and Shanika Karunasekera: Computers & Security, Vol. 29(2010) No. 1, pp.124-140.

Google Scholar

[2] Mrutyunjaya Panda, Ajith Abraham and Manas Ranjan Patra: Procedia Engineering, Vol. 30(2012), pp.1-9.

Google Scholar

[3] M. Govindarajan and RM. Chandrasekaran: Computer Networks, Vol. 55(2011) No. 8, pp.1662-1671.

Google Scholar

[4] Saurabh Mukherjee and Neelam Sharma: Procedia Technology, Vol. 4(2012), pp.119-128.

Google Scholar

[5] Yuan-Hai Shao and Nai-Yang Deng: Neural Networks, Vol. 25(2012) No. 1, pp.114-121.

Google Scholar

[6] Unal Akdag, M. Aydin Komur and A. Feridun Ozguc: Advances in Engineering Software, Vol. 40(2009) No. 9, pp.864-870.

DOI: 10.1016/j.advengsoft.2009.01.010

Google Scholar

[7] Meiqin Liu: Neural Networks, Vol. 22(2009) No. 7, pp.949-957.

Google Scholar