An efficient SVM-based method to detect malicious attacks for web servers

被引:0
作者
Yang, W [1 ]
Yun, XC
Li, JH
机构
[1] Harbin Engn Univ, Informat Secur Res Ctr, Harbin 150001, Peoples R China
[2] Harbin Inst Technol, Comp Network & Informat Secur Technique Res Ctr, Harbin 150001, Peoples R China
[3] Shanghai Jiao Tong Univ, Coll Informat Secur Engn, Shanghai 200030, Peoples R China
来源
ADVANCED WEB AND NETWORK TECHNOLOGIES, AND APPLICATIONS, PROCEEDINGS | 2006年 / 3842卷
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, with the rapid development of network technique and network bandwidth, the network attacking events for web servers such as DOS/PROBE are becoming more and more frequent. In order to detect these types of intrusions in the new network environment more efficiently, this paper applies new machine learning methods to intrusion detection and proposes an efficient algorithm based on vector quantization and support vector machine for intrusion detection (VQ-SVM). The algorithm Firstly reduces the network auditing dataset by using VQ techniques, produces a codebook as the training example set, and then adopts fast training algorithm for SVM to build intrusion detection model on the codebook. The experiment results indicate that the combined algorithm of VQ-SVM can greatly improve the learning and detecting efficiency of the traditional SVM-based intrusion detection model.
引用
收藏
页码:835 / 841
页数:7
相关论文
共 12 条
  • [1] ANDERSON JP, 1995, DETECTION UNUSUAL PR
  • [2] APN JS, 2000, SIGNAL PROCESS, V7, P1513
  • [3] Debar H., 1992, Proceedings. 1992 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.92CH3157-5), P240, DOI 10.1109/RISP.1992.213257
  • [4] STATE TRANSITION ANALYSIS - A RULE-BASED INTRUSION DETECTION APPROACH
    ILGUN, K
    KEMMERER, RA
    PORRAS, PA
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1995, 21 (03) : 181 - 199
  • [5] KARLTON S, 2002, P 8 ACM SIGKDD INT C, P386
  • [6] ALGORITHM FOR VECTOR QUANTIZER DESIGN
    LINDE, Y
    BUZO, A
    GRAY, RM
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 1980, 28 (01) : 84 - 95
  • [7] Intrusion detection using neural networks and support vector machines
    Mukkamala, S
    Janoski, G
    Sung, A
    [J]. PROCEEDING OF THE 2002 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, VOLS 1-3, 2002, : 1702 - 1707
  • [8] Platt J., 1999, ADV KERNEL METHODS S
  • [9] TAYLOR C, 2002, P NEW SEC PAR WORKSH, P89
  • [10] Vapnik V, 1999, NATURE STAT LEARNING