An enhanced support vector machine model for intrusion detection

作者: JingTao Yao , Songlun Zhao , Lisa Fan

DOI: 10.1007/11795131_78

关键词:

摘要: Design and implementation of intrusion detection systems remain an important research issue in order to maintain proper network security. Support Vector Machines (SVM) as a classical pattern recognition tool have been widely used for detection. However, conventional SVM methods do not concern different characteristics features building system. We propose enhanced model with weighted kernel function based on the training data Rough set theory is adopted perform feature ranking selection task new model. evaluate KDD dataset UNM dataset. It suggested that proposed outperformed precision, computation time, false negative rate

参考文章(16)
Jianchao Han, Ricardo Sanchez, Xiaohua Hu, Feature Selection Based on Relative Attribute Dependency: An Experimental Study Lecture Notes in Computer Science. pp. 214- 223 ,(2005) , 10.1007/11548669_23
JingTao Yao, Ming Zhang, Feature Selection with Adjustable Criteria Lecture Notes in Computer Science. pp. 204- 213 ,(2005) , 10.1007/11548669_22
Thorsten Joachims, Making large scale SVM learning practical Technical reports. ,(1999) , 10.17877/DE290R-14262
Wenke Lee, Salvatore J. Stolfo, Data mining approaches for intrusion detection usenix security symposium. pp. 6- 6 ,(1998) , 10.21236/ADA401496
Yuchang Lu, Chunyi Shi, Keyun Hu, Feature ranking in rough sets Ai Communications. ,vol. 16, pp. 41- 50 ,(2003)
George H John, Ron Kohavi, Karl Pfleger, None, Irrelevant Features and the Subset Selection Problem Machine Learning Proceedings 1994. pp. 121- 129 ,(1994) , 10.1016/B978-1-55860-335-6.50023-4
Y. Qiao, X.W. Xin, Y. Bin, S. Ge, Anomaly intrusion detection method based on HMM Electronics Letters. ,vol. 38, pp. 663- 664 ,(2002) , 10.1049/EL:20020467
H. Hasegawa, H. Okizaki, M.I.S. and Schottky slow-wave coplanar striplines on GaAs substrates Electronics Letters. ,vol. 13, pp. 663- 664 ,(1977) , 10.1049/EL:19770471
William B. Frakes, Ricardo Baeza-Yates, Information Retrieval: Data Structures and Algorithms ,(1992)
Jing T. Yao, Song L. Zhao, Larry V. Saxton, A study on fuzzy intrusion detection Data mining, intrusion detection, information assurance, and data networks security. Conference. ,vol. 5812, pp. 23- 30 ,(2005) , 10.1117/12.604465