Support Vector Machine Based Intrusion Detection Method Combined with Nonlinear Dimensionality Reduction Algorithm

نویسنده

  • Xiaoping Li
چکیده

Network security is one of the most important issues in the field of computer science. The network intrusion may bring disaster to the network users. It is therefore critical to monitor the network intrusion to prevent the computers from attacking. The intrusion pattern identification is the key point in the intrusion detection. The use of the support vector machine (SVM) can provide intelligent intrusion detection even using a small amount of training sample data. However, the intrusion detection efficiency is still influenced by the input features of the ANN. This is because the original feature space always contains a certain number of redundant data. To solve this problem, a new network intrusion detection method based on nonlinear dimensionality reduction and least square support vector machines (LS-SVM) is proposed in this work. The Isometric Mapping (Isomap) was employed to reduce the dimensionality of the original intrusion feature vector. Then the LS-SVM detection model with proper input features was applied to the intrusion pattern recognition. The efficiency of the proposed method was evaluated with the real intrusion data. The analysis results show that the proposed approach has good intrusion detection rate, and is superior to the traditional LSSVM method with a 5.8 % increase of the detection precision. Copyright © 2013 IFSA.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

New Intelligent Computer Intrusion Detection Method Using Hessian Local Linear Embedding and Multi-Kernel Support Vector Machine

Computer networks frequently collapse under the destructive intrusions. It is crucial to detection hidden intrusions to protect the computer networks. However, a computer intrusion often distributes high dimensional characteristic signals, which increases the difficulty of intrusion detection. Literature review indicates that limited work has been done to address the nonlinear dimension reducti...

متن کامل

Classification of handwritten digits using supervised locally linear embedding algorithm and support vector machine

The locally linear embedding (LLE) algorithm is an unsupervised technique recently proposed for nonlinear dimensionality reduction. In this paper, we describe its supervised variant (SLLE). This is a conceptually new method, where class membership information is used to map overlapping high dimensional data into disjoint clusters in the embedded space. In experiments, we combined it with suppor...

متن کامل

A New Method for Intrusion Detection using Manifold Learning Algorithm

Computer and network security has received and will still receive much attention. Any unexpected intrusion will damage the network. It is therefore imperative to detect the network intrusion to ensure the normal operation of the internet. There are many studies in the intrusion detection and intrusion patter recognition. The artificial neural network (ANN) has proven to be powerful for the intr...

متن کامل

Intrusion Detection System using Support Vector Machine

As the communication industry has connected distant corners of the globe using advances in network technology, intruders or attackers have also increased attacks on networking infrastructure commensurately. System administrators can attempt to prevent such attacks by using intrusion detection tools and systems. In recent years Machine Learning (ML) algorithms has been gaining popularity in Intr...

متن کامل

Anomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors

Abstract- With the advancement and development of computer network technologies, the way for intruders has become smoother; therefore, to detect threats and attacks, the importance of intrusion detection systems (IDS) as one of the key elements of security is increasing. One of the challenges of intrusion detection systems is managing of the large amount of network traffic features. Removing un...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013