A Collaborative and Adaptive Intrusion Detection Based on SVMs and Decision Trees

作者: Luyao Teng , Shaohua Teng , Feiyi Tang , Haibin Zhu , Wei Zhang

DOI: 10.1109/ICDMW.2014.147

关键词: Artificial intelligenceData miningMachine learningNetwork securityIntrusion detection systemSupport vector machineComputer scienceFeature extractionDecision treeScheduling (computing)

摘要: Because network security has become one of the most serious problems in world, intrusion detection is an important defence tool security. In this paper, A cooperative and adaptive method proposed a corresponding model designed implemented. The E-CARGO used to build collaborative model. roles, agents groups based on 2-class Support Vector Machines (SVMs) Decision Trees (DTs) are described built, scheduling mechanisms designed. Finally, KDD CUP 1999 data set verify effectiveness our method. Experimental results show that paper superior SVM accuracy efficiency.

参考文章(22)
Yinhui Li, Jingbo Xia, Silan Zhang, Jiakai Yan, Xiaochuan Ai, Kuobin Dai, An efficient intrusion detection system based on support vector machines and gradually feature removal method Expert Systems With Applications. ,vol. 39, pp. 424- 430 ,(2012) , 10.1016/J.ESWA.2011.07.032
Carlos A. Catania, Facundo Bromberg, Carlos García Garino, An autonomous labeling approach to support vector machines algorithms for network traffic anomaly detection Expert Systems With Applications. ,vol. 39, pp. 1822- 1829 ,(2012) , 10.1016/J.ESWA.2011.08.068
Wei Zhang, Shaohua Teng, Haibin Zhu, Dongning Liu, A Cooperative Intrusion Detection Model Based on Granular Computing and Agent Technologies International Journal of Agent Technologies and Systems. ,vol. 5, pp. 54- 74 ,(2013) , 10.4018/IJATS.2013070104
Shi-Jinn Horng, Ming-Yang Su, Yuan-Hsin Chen, Tzong-Wann Kao, Rong-Jian Chen, Jui-Lin Lai, Citra Dwi Perkasa, A novel intrusion detection system based on hierarchical clustering and support vector machines Expert Systems With Applications. ,vol. 38, pp. 306- 313 ,(2011) , 10.1016/J.ESWA.2010.06.066
C. Kolias, G. Kambourakis, M. Maragoudakis, Swarm intelligence in intrusion detection: A survey Computers & Security. ,vol. 30, pp. 625- 642 ,(2011) , 10.1016/J.COSE.2011.08.009
Haibin Zhu, MengChu Zhou, Efficient Role Transfer Based on Kuhn–Munkres Algorithm systems man and cybernetics. ,vol. 42, pp. 491- 496 ,(2012) , 10.1109/TSMCA.2011.2159587
Shih-Wei Lin, Kuo-Ching Ying, Chou-Yuan Lee, Zne-Jung Lee, None, An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection soft computing. ,vol. 12, pp. 3285- 3290 ,(2012) , 10.1016/J.ASOC.2012.05.004
Gisung Kim, Seungmin Lee, Sehun Kim, A novel hybrid intrusion detection method integrating anomaly detection with misuse detection Expert Systems With Applications. ,vol. 41, pp. 1690- 1700 ,(2014) , 10.1016/J.ESWA.2013.08.066
Bo Chen, Agent-based artificial immune system approach for adaptive damage detection in monitoring networks Journal of Network and Computer Applications. ,vol. 33, pp. 633- 645 ,(2010) , 10.1016/J.JNCA.2010.03.011
Haibin Zhu, MengChu Zhou, Role-based collaboration and its kernel mechanisms systems man and cybernetics. ,vol. 36, pp. 578- 589 ,(2006) , 10.1109/TSMCC.2006.875726