Research on Intrusion Detection System Based on Improved PSO-SVM algorithm

نویسندگان

  • Tichun Wang
  • Hongyang Zhang
  • Lei Tian
  • Bin Tan
  • Yang Tan
  • Yuanxu Li
چکیده

With the rapid development of Internet, the network topology structure becomes more and more complex, so that the monitoring of network attack has become quite difficult. The traditional passive defence strategy has been unable to meet the demand of network information security. How to effectively detect and prevent the network intrusion have become an important matter in the field of computer security. The efficient intrusion detection system can reduce the false positive rate of the system, and improve the classification accuracy. This paper firstly introduces the intrusion detection system and detection data set. On this basis, this paper proposes an intrusion detection method based on improved PSO-SVM. The support vector machine can ensure that classifier has high classification accuracies. Secondly, we use PSO method to determine the important parameters of the SVM algorithm, such as the RBF kernel parameter, penalty parameter and insensitive loss error. Then, the improved PSO method can find the optimal value of the SVM. At this time, the error sum of squares of the SVM model has a minimum value, and the model has a fast convergence speed. Finally, because the training data sets of DoS and Probe are accounted for a larger proportion of all attacks, we use the IPSO-SVM classification algorithm for them, and have a test to the intrusion detection. The experimental results show that the overall performance of the proposed detection algorithm is very high. It has a strong ability to identify the characteristics of intrusion, and can provide the intrusion detection services for virtual environment.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Network Intrusion Detection Based on PSO-SVM

In order to improve network intrusion detection precision, this paper proposed a network intrusion detection model based on simultaneous selecting features and parameters of support vector machine (SVM) by particle swarm optimization (PSO) algorithm. Firstly, the features and parameters of SVM are coded to particle, and then the PSO is used to find the optimal features and SVM parameters by col...

متن کامل

A Real-time Intrusion Detection System Based on PSO-SVM

The success of any Intrusion Detection System (IDS) is a complicated problem due to its nonlinearity and the quantitative or qualitative network traffic data stream with irrelevant and redundant features. How to choose the effective and key features to IDS is very important topic in information security. Support vector machine (SVM) has been employed to provide potential solutions for the IDS p...

متن کامل

Classification of Intrusion Detection using PSO-SVM and Improved Decision Tree

Intrusion Detection is an efficient way of detecting the abnormal behavior of packets in the network, Although in data mining there are various effective decision tree based algorithms are implemented for the classification and detection of Intrusions in KDDCup99 Dataset. Here an efficient technique is implemented for the classification and detection of Intrusions in KDDCup99 Dataset using Feat...

متن کامل

Support Vector Machine with Improved Particle Swarm Optimization Model for Intrusion Detection

Intrusion Detection System (IDS) is a computer-based data system which purports to observe attacks against computer systems and networks or, against any information system. Its job is to supervise the utilization of such system to detect any insecure states. IDS detect attempts and active misuse of the scheme either by lawful users of the information systems or by outside parties to abuse privi...

متن کامل

Intrusion Detection based on a Novel Hybrid Learning Approach

Information security and Intrusion Detection System (IDS) plays a critical role in the Internet. IDS is an essential tool for detecting different kinds of attacks in a network and maintaining data integrity, confidentiality and system availability against possible threats. In this paper, a hybrid approach towards achieving high performance is proposed. In fact, the important goal of this paper ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016