Intrusion Detection System Using PCA and Kernel PCA Methods

نویسنده

  • Z. Elkhadir
چکیده

The network traffic data used to build an intrusion detection system is frequently enormous and redundant with important useless information which decreases IDS efficiency. In order to overcome this problem, we have to reduce as much as possible this meaningless information from the original high dimensional data. To do this, we have compared the performance of two features reduction techniques namely, Principal Component Analysis (PCA) and Kernel Principal Component Analysis (KPCA). After the step of dimension reduction, data samples are classified using k nearest neighbor (K-NN) or decision tree algorithm in order to check whether these samples are normal or anomalous network connection. In this paper, the two well-known KDDcup99 and NSL-KDD databases have been used for testing the proposed approaches. Experimental results show that KPCA with the power kernel performs better than many other types of kernels, especially once we have used the KNN classifier. Additionally, we have noted that KPCA method also overcomes PCA in detecting denial of service (DOS) and probing attacks. Lastly, when we have employed a decision tree classifier, KPCA with the spherical kernel takes the advantage over the same kernels used with KNN.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improving Accuracy of Intrusion Detection Model Using PCA and optimized SVM

Extended version of the paper “Intrusion Detection Model Using Fusion of PCA and Optimized SVM” previously presented at International Conference on Computing and Informatics (IC3I), held on November 27–29, 2014, in Mysore, India. Intrusion detection is very essential for providing security to different network domains and is mostly used for locating and tracing the intruders. There are many pro...

متن کامل

Design of Anomaly Detection System for Outlier Detection in Hardware Profile Using PCA

In this paper, we design an Anomaly Detection System for Outlier Detection in Hardware Profile by using Principal Component Analysis (PCA) that helps reduce the dimension of data. Anomaly detection methods can detect new intrusions, but they suffer from false alarms. Another approach is misuse detection that identifies only known attacks by matching with the previous patterns. Host based Intrus...

متن کامل

Kernel PCA for Feature Extraction and De - Noising in 34 Nonlinear Regression

39 40 41 In this paper, we propose the application of the 42 Kernel Principal Component Analysis (PCA) tech43 nique for feature selection in a high-dimensional 44 feature space, where input variables are mapped by 45 a Gaussian kernel. The extracted features are 46 employed in the regression problems of chaotic 47 Mackey–Glass time-series prediction in a noisy 48 environment and estimating huma...

متن کامل

The main essence of using statistical methods for outlier detection in anomaly-based approach lies in analyzing and mining information from raw data, to improve learning

Intrusion detection is an effective mechanism to deal with challenges in network security. The rapid development in networking technology has raised the need for an effective intrusion detection system (IDS) as traditional intrusion detection methods cannot compete against the newly advanced intrusion attacks. With increasing number of data being transmitted daily to/from a network, the system ...

متن کامل

Unsupervised ensemble change detection using kernel PCA

In this paper, we present a novel approach for unsupervised change detection on multi-spectral satellite images. The advantage of unsupervised approach over the supervised one is that the generation of an appropriated ground truth is not required. Especially, when the ground truth is not available, the unsupervised approach is the fundamental one. The unsupervised change detection method used i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015