Open Access Open Access  Restricted Access Subscription or Fee Access

Intrusion Detection System Using Modified Support Vector Machine

P. Lakshmi, D. Geetha

Abstract


In network security, intrusion detection system plays an important role as it is able to detect various types of attacks in the network. The main idea of the intrusion detection system is to recognize the malicious attacks which intimidate the security from the information system’s normal activities. The intrusion detection system can be formulated basically as a problem of binary classification, so that it can be solved using effective classification technique. Support Vector Machine (SVM) is the most prominent classification algorithms in the area of data mining, but it has limitation such as extensive training time. To rectify this limitation, a modified version of SVM is introduced in this work. In this work, classification is done using modified SVM and evaluation of the proposed method is done using KDD dataset by conducting experiments. The experimental result proved that the extensive time is reduced using modified SVM by performing proper dataset.

Keywords


Data Mining Technique, Intrusion Detection System, Support Vector Machine, Modified Support Vector Machine

Full Text:

PDF

References


Shakshuki, Elhadi M., Nan Kang, and Tarek R. Sheltami. "EAACK—a secure intrusion-detection system for MANETs." Industrial Electronics, IEEE Transactions on 60, no. 3 (2013): 1089-1098.

Hoque, Mohammad Sazzadul, Md Mukit, Md Bikas, and Abu Naser. "An implementation of intrusion detection system using genetic algorithm." arXiv preprint arXiv:1204.1336 (2012).

Liao, Hung-Jen, Chun-Hung Richard Lin, Ying-Chih Lin, and Kuang-Yuan Tung. "Intrusion detection system: A comprehensive review." Journal of Network and Computer Applications 36, no. 1 (2013): 16-24.

Dhage, Sudhir N., and B. B. Meshram. "Intrusion detection system in cloud computing environment." International Journal of Cloud Computing 1, no. 2-3 (2012): 261-282.

Li, Yinhui, Jingbo Xia, Silan Zhang, Jiakai Yan, Xiaochuan Ai, and Kuobin Dai. "An efficient intrusion detection system based on support vector machines and gradually feature removal method." Expert Systems with Applications 39, no. 1 (2012): 424-430.

Koc, Levent, Thomas A. Mazzuchi, and Shahram Sarkani. "A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier." Expert Systems with Applications 39, no. 18 (2012): 13492-13500.

Om, Hari, and Aritra Kundu. "A hybrid system for reducing the false alarm rate of anomaly intrusion detection system." In Recent Advances in Information Technology (RAIT), 2012 1st International Conference on, pp. 131-136. IEEE, 2012.

Trivedi, Animesh Kr, Rishi Kapoor, Rajan Arora, Sudip Sanyal, and Sugata Sanyal. "RISM--Reputation Based Intrusion Detection System for Mobile Ad hoc Networks." arXiv preprint arXiv:1307.7833 (2013).

Shelke, Ms Parag K., Ms Sneha Sontakke, and A. D. Gawande. "Intrusion detection system for cloud computing." International Journal of Scientific & Technology Research 1, no. 4 (2012): 67-71.

Jha, Jayshree, and Leena Ragha. "Intrusion Detection System using Support Vector Machine." International Journal of Applied Information Systems (HAIS)-ISSN: (2013) 2249-0868.

Modi, Chirag, Dhiren Patel, Bhavesh Borisaniya, Hiren Patel, Avi Patel, and Muttukrishnan Rajarajan. "A survey of intrusion detection techniques in cloud." Journal of Network and Computer Applications 36, no. 1 (2013): 42-57.

Zhang, Mohua, and Ge Li. "Network intrusion detection based on least squares support vector machine and chaos particle swarm optimization algorithm." Journal of Convergence Information Technology 7, no. 4 (2012).

Bhavsar, Yogita B., and Kalyani C. Waghmare. "Intrusion Detection System Using Data Mining Technique: Support Vector Machine." International Journal of Emerging Technology and Advanced Engineering 3, no. 3 (2013): 581-586.

Satpute, Khushboo, Shikha Agrawal, Jitendra Agrawal, and Sanjeev Sharma. "A survey on anomaly detection in network intrusion detection system using particle swarm optimization based machine learning techniques." InProceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA), pp. 441-452. Springer Berlin Heidelberg, 2013.

Zhang, Zonghua, and Hong Shen. "Online training of svms for realtime intrusion detection based on improved text categorization model." Computer Communications 28, no. 12 (2005): 1428-1443.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.