Network anomaly intrusion detection CVM model based on PLS feature extraction

被引:0
作者
Wu L.-Y. [1 ]
Li S.-L. [1 ]
Gan X.-S. [2 ]
Wang M.-H. [2 ]
机构
[1] Logistic Engineering University of PLA, Chongqing
[2] Air Traffic Control and Navigation College, Air Force Engineering University, Xi'an
来源
Kongzhi yu Juece/Control and Decision | 2017年 / 32卷 / 04期
关键词
Core vector machine; Feature extraction; Intrusion detection; Partial least square;
D O I
10.13195/j.kzyjc.2016.0133
中图分类号
学科分类号
摘要
In order to improve the protection level of network security, a combined anomaly intrusion detection method based on the partial least squares(PLS) method and the kernel vector machine(CVM) is proposed. The PLS algorithm is used to extract the principal components of the network data and construct the feature set. Then the CVM is applied to build the anomaly intrusion detection model of the feature set, completing the detection and decision of abnormal intrusion. Simulation results show that the proposed method has the fast processing ability similar with the CVM for the large scale data, and the detection performance is roughly equivalent to that of L1-SVM and L2-SVM, and the detection level is relatively high when the principal component is 1 538, which proves the effectivenes and feasibility of the method in the application of anomaly intrusion detection. © 2017, Editorial Office of Control and Decision. All right reserved.
引用
收藏
页码:755 / 758
页数:3
相关论文
共 10 条
  • [1] Feng X., Ma M.Y., Zhao T.L., Et al., Intrusion detection system based on hybrid immune algorithm, Computer Science, 41, 12, pp. 43-47, (2014)
  • [2] Yang B., Wang X., Du J., Adaptive network intrusion detection method based on rough set, Computer Application and Software, 31, 11, pp. 318-320, (2014)
  • [3] Wang Y., Xiong Y., Gong X.D., Et al., Based on chaos PSO algorithm optimize RBF network intrusion detection, Computer Engineering and Applications, 49, 10, pp. 84-87, (2013)
  • [4] Sun X., Xu C.X., Gao Y., Research of android abnormal intrusion detection based on feature-weighted K-nearest-neighbor SVM, Computer Science, 42, 4, pp. 116-118, (2015)
  • [5] Bace R., Intrusion Detection, (2000)
  • [6] Verwoerd T., Hunt R., Intrusion detection techniques and approaches, Computer Communications, 25, 15, pp. 1356-1365, (2002)
  • [7] Endorf C., Schultz E., Mellander J., Intrusion Detection & Prevention, (2004)
  • [8] Barker M., Rayens W., Partial least squares for discrimination, J of Chemometrics, 17, pp. 166-173, (2003)
  • [9] Tsang I.W., Kwok J.T., Cheung P.M., Core vector machines: Fast SVMtraining on very large data sets, J of Machine Learning Research, 6, pp. 363-392, (2005)
  • [10] Chu C.S., Tsang I.W., Kwok J.T., Scaling up support vector data description by using core sets, Proc of IEEE Int Joint Conf on Neural Networks, pp. 425-430, (2004)