Intrusion Detection System Using PCA and Kernel PCA Methods
نویسنده
چکیده
The network traffic data used to build an intrusion detection system is frequently enormous and redundant with important useless information which decreases IDS efficiency. In order to overcome this problem, we have to reduce as much as possible this meaningless information from the original high dimensional data. To do this, we have compared the performance of two features reduction techniques namely, Principal Component Analysis (PCA) and Kernel Principal Component Analysis (KPCA). After the step of dimension reduction, data samples are classified using k nearest neighbor (K-NN) or decision tree algorithm in order to check whether these samples are normal or anomalous network connection. In this paper, the two well-known KDDcup99 and NSL-KDD databases have been used for testing the proposed approaches. Experimental results show that KPCA with the power kernel performs better than many other types of kernels, especially once we have used the KNN classifier. Additionally, we have noted that KPCA method also overcomes PCA in detecting denial of service (DOS) and probing attacks. Lastly, when we have employed a decision tree classifier, KPCA with the spherical kernel takes the advantage over the same kernels used with KNN.
منابع مشابه
Improving Accuracy of Intrusion Detection Model Using PCA and optimized SVM
Extended version of the paper “Intrusion Detection Model Using Fusion of PCA and Optimized SVM” previously presented at International Conference on Computing and Informatics (IC3I), held on November 27–29, 2014, in Mysore, India. Intrusion detection is very essential for providing security to different network domains and is mostly used for locating and tracing the intruders. There are many pro...
متن کاملDesign of Anomaly Detection System for Outlier Detection in Hardware Profile Using PCA
In this paper, we design an Anomaly Detection System for Outlier Detection in Hardware Profile by using Principal Component Analysis (PCA) that helps reduce the dimension of data. Anomaly detection methods can detect new intrusions, but they suffer from false alarms. Another approach is misuse detection that identifies only known attacks by matching with the previous patterns. Host based Intrus...
متن کاملKernel PCA for Feature Extraction and De - Noising in 34 Nonlinear Regression
39 40 41 In this paper, we propose the application of the 42 Kernel Principal Component Analysis (PCA) tech43 nique for feature selection in a high-dimensional 44 feature space, where input variables are mapped by 45 a Gaussian kernel. The extracted features are 46 employed in the regression problems of chaotic 47 Mackey–Glass time-series prediction in a noisy 48 environment and estimating huma...
متن کاملThe main essence of using statistical methods for outlier detection in anomaly-based approach lies in analyzing and mining information from raw data, to improve learning
Intrusion detection is an effective mechanism to deal with challenges in network security. The rapid development in networking technology has raised the need for an effective intrusion detection system (IDS) as traditional intrusion detection methods cannot compete against the newly advanced intrusion attacks. With increasing number of data being transmitted daily to/from a network, the system ...
متن کاملUnsupervised ensemble change detection using kernel PCA
In this paper, we present a novel approach for unsupervised change detection on multi-spectral satellite images. The advantage of unsupervised approach over the supervised one is that the generation of an appropriated ground truth is not required. Especially, when the ground truth is not available, the unsupervised approach is the fundamental one. The unsupervised change detection method used i...
متن کامل