Feature Ranking and Selection for Intrusion Detection Systems Using Support Vector Machines

作者: Srinivas Mukkamala , Andrew H. Sung

DOI:

关键词: Support vector machineAnomaly-based intrusion detection systemFeature (computer vision)Component (UML)Information systemRank (computer programming)Artificial neural networkComputer scienceIntrusion detection systemArtificial intelligenceMachine learningData mining

摘要: Intrusion detection is a critical component of secure information systems. This paper addresses the issue identifying important input features in building an intrusion system (IDS). Since elimination insignificant and/or useless inputs leads to simplification problem, faster and more accurate may result. Feature ranking selection, therefore, detection. support vector machines (SVMs) tend scale better run than neural networks with higher accuracy, we apply technique deleting one feature at time perform experiments on SVMs rank importance for DARPA collected data. Important each 5 classes patterns data are identified. It shown that SVM-based IDSs using reduced number can deliver enhanced or comparable performance. An IDS class-specific based five proposed.

参考文章(16)
Guadalupe I. Janoski, Srinivas Mukkamala, Andrew H. Sung, Monitoring Information System Security ,(2001)
Thorsten Joachims, Estimating the Generalization Performance of an SVM Efficiently international conference on machine learning. pp. 431- 438 ,(2000) , 10.17877/DE290R-5102
Thorsten Joachims, Making large scale SVM learning practical Technical reports. ,(1999) , 10.17877/DE290R-14262
Thorsten Joachims, Estimating the generalization performance of a SVM efficiently Technical reports. ,(2001)
Aaron Schwartzbard, Michael Schatz, Anup K. Ghosh, Learning program behavior profiles for intrusion detection ID'99 Proceedings of the 1st conference on Workshop on Intrusion Detection and Network Monitoring - Volume 1. pp. 6- 6 ,(1999)
H. Debar, B. Dorizzi, An application of a recurrent network to an intrusion detection system international joint conference on neural network. ,vol. 2, pp. 478- 483 ,(1992) , 10.1109/IJCNN.1992.226942
A.H. Sung, Ranking importance of input parameters of neural networks Expert Systems with Applications. ,vol. 15, pp. 405- 411 ,(1998) , 10.1016/S0957-4174(98)00041-4
Jianxiong Luo, Susan M. Bridges, Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection International Journal of Intelligent Systems. ,vol. 15, pp. 687- 703 ,(2000) , 10.1002/1098-111X(200008)15:8<687::AID-INT1>3.0.CO;2-X
Sandeep Kumar, Eugene H Spafford, None, An Application of Pattern Matching in Intrusion Detection ,(1994)