Network Intrusion Detection Method Based on Optimized Multiclass Support Vector Machine

被引:0
作者
Li, Yuancheng [1 ]
Shang, Shaofa [1 ]
Wang, Na [1 ]
Wang, Mei [1 ]
机构
[1] Xian Univ Sci & Technol, Coll Comp Sci & Technol, Xian, Peoples R China
来源
ARTIFICIAL INTELLIGENCE AND ROBOTICS, ISAIR 2022, PT II | 2022年 / 1701卷
关键词
Network intrusion detection; Support vector machine; Data block; Multiclass;
D O I
10.1007/978-981-19-7943-9_24
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the popularization of network applications and the great changes in the international political, economic and military situations, network security is becoming more and more important. As an important part of network security, network intrusion detection (NID) is still facing the problem of low detection rate and difficulty to meet the real-time demand with the rapid increase of network traffic. Therefore, for the requirement of fast and accurate detection in real-time applications, this paper proposes a NID method based on optimized multiclass support vector machine (SVM). Firstly, the ReliefF feature selection algorithm is introduced to extract features with heuristic search rules based on variable similarity, which reduces the complexity of features and the amount of calculation; Secondly, a SVM training method based on data block method is proposed to improve the training speed; Finally, a multiclass SVM classifier is designed for typical attack types. Experimental results show that the proposed optimization method can achieve a detection rate of 96.9% and shorten the training time by 13.2% on average.
引用
收藏
页码:277 / 286
页数:10
相关论文
共 18 条
  • [1] Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues
    Aldweesh, Arwa
    Derhab, Abdelouahid
    Emam, Ahmed Z.
    [J]. KNOWLEDGE-BASED SYSTEMS, 2020, 189 (189)
  • [2] Application Layer DDoS Attack Detection Using Cuckoo Search Algorithm-Trained Radial Basis Function
    Beitollahi, Hakem
    Sharif, Dyari Mohammad
    Fazeli, Mahdi
    [J]. IEEE ACCESS, 2022, 10 : 63844 - 63854
  • [3] Chikkalwar SR., 2020, Int J Intell Eng Syst, V15, P406
  • [4] A Survey on Data-driven Network Intrusion Detection
    Chou, Dylan
    Jiang, Meng
    [J]. ACM COMPUTING SURVEYS, 2022, 54 (09)
  • [5] Elkan C., 2000, Acm Sigkdd Explorations Newsletter, V1, P63
  • [6] A bidirectional LSTM deep learning approach for intrusion detection
    Imrana, Yakubu
    Xiang, Yanping
    Ali, Liaqat
    Abdul-Rauf, Zaharawu
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2021, 185 (185)
  • [7] kdd.ics.uci.edu, 2001, About us
  • [8] Underwater image de-scattering and classification by deep neural network
    Li, Yujie
    Lu, Huimin
    Li, Jianru
    Li, Xin
    Li, Yun
    Serikawa, Seiichi
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2016, 54 : 68 - 77
  • [9] Brain Intelligence: Go beyond Artificial Intelligence
    Lu, Huimin
    Li, Yujie
    Chen, Min
    Kim, Hyoungseop
    Serikawa, Seiichi
    [J]. MOBILE NETWORKS & APPLICATIONS, 2018, 23 (02) : 368 - 375
  • [10] Data-Driven Intrusion Detection for Intelligent Internet of Vehicles: A Deep Convolutional Neural Network-Based Method
    Nie, Laisen
    Ning, Zhaolong
    Wang, Xiaojie
    Hu, Xiping
    Cheng, Jun
    Li, Yongkang
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2020, 7 (04): : 2219 - 2230