A new intrusion detection method based on SVM with minimum within-class scatter

被引:21
作者
An, Wenjuan [1 ,2 ]
Liang, Mangui [1 ,2 ]
机构
[1] Beijing Jiaotong Univ, Inst Informat Sci, Beijing 100044, Peoples R China
[2] Beijing Key Lab Adv Informat Sci & Network Techno, Beijing 100044, Peoples R China
关键词
intrusion detection systems; prior knowledge; support vector machine; within-class scatter;
D O I
10.1002/sec.666
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection has become an indispensable technique to ensure the security and reliability of information systems. Support vector machine (SVM) and its many improved algorithms have been successfully applied to intrusion detection systems in recent years. However, the training process of SVM ignores an important prior knowledge, the within-class structure in the training set. In this paper, we propose an improved classification algorithm, which combines minimum within-class scatter in Fisher discriminant analysis with traditional SVM. The central idea is to find an optimal separating hyperplane such that the margin is maximized, whereas the within-class scatter is kept as small as possible. This new algorithm is called SVM with minimum within-class scatter (WCS-SVM). A set of experiments is conducted on ten benchmarking datasets and KDDCUP'99 experimental data of MIT Lincoln Laboratory to test the generalization performance of the WCS-SVM algorithm. Experimental results show that the WCS-SVM algorithm has better discriminatory power than traditional SVM and kernel Fisher discriminant analysis and it has higher true detection rate and lower false positive rate for intrusion detection systems. Copyright (c) 2012 John Wiley & Sons, Ltd.
引用
收藏
页码:1064 / 1074
页数:11
相关论文
共 24 条
[11]   The use of multiple measurements in taxonomic problems [J].
Fisher, RA .
ANNALS OF EUGENICS, 1936, 7 :179-188
[12]   Markov chains, classifiers, and intrusion detection [J].
Jha, S ;
Tan, K ;
Maxion, RA .
14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2001, :206-219
[13]   A new intrusion detection system using support vector machines and hierarchical clustering [J].
Khan, Latifur ;
Awad, Mamoun ;
Thuraisingham, Bhavani .
VLDB JOURNAL, 2007, 16 (04) :507-521
[14]   A data mining framework for building intrusion detection models [J].
Lee, W ;
Stolfo, SJ ;
Mok, KW .
PROCEEDINGS OF THE 1999 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 1999, :120-132
[15]   A formal analysis of stopping criteria of decomposition methods for support vector machines [J].
Lin, CJ .
IEEE TRANSACTIONS ON NEURAL NETWORKS, 2002, 13 (05) :1045-1052
[16]  
Mangasarian OL, 2001, J MACHINE LEARNING R, V1
[17]  
MIKA S, 1999, P IEEE NEUR NETW SIG
[18]  
Okutmustur B, 2005, THESIS BILKENT U
[19]  
Roth V, 2000, ADV NEUR IN, V12, P568
[20]   Least squares support vector machine classifiers [J].
Suykens, JAK ;
Vandewalle, J .
NEURAL PROCESSING LETTERS, 1999, 9 (03) :293-300