Intrusion Detection System Based on SVM for WLAN

被引:24
作者
Mohammed, Muamer N. [1 ]
Sulaiman, Norrozila [1 ]
机构
[1] Univ Malaysia Pahang, Fac Comp Syst & Software Engn, Kuantan 26300, Malaysia
来源
FIRST WORLD CONFERENCE ON INNOVATION AND COMPUTER SCIENCES (INSODE 2011) | 2012年 / 1卷
关键词
intrusion detection; support vector machine; wireless local area network;
D O I
10.1016/j.protcy.2012.02.066
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Intrusion detection is a problem of great significance to protecting information systems security, especially in view of the worldwide increasing incidents of cyber-attacks. This paper focus on improving intrusion system in wireless local area network by using Support Vector Machines (SVM). The data that are used in our experiments originated from a computer Lab. SVM performs intrusion detection based on recognized attack patterns. Simulation result show that proposed detection system can recognizes anomalies and raises an alarm. In addition, evaluation produced a better result in terms of the detection efficiency and false alarm rate which may give better coverage, and make the detection more effective. (C) 2011 Published by Elsevier Ltd.
引用
收藏
页码:313 / 317
页数:5
相关论文
共 16 条
[1]  
Allen W.H, 2005, SOUTHEASTCON P IEEE
[2]  
[Anonymous], 2000, NATURE STAT LEARNING, DOI DOI 10.1007/978-1-4757-3264-1
[3]   A tutorial on v-support vector machines [J].
Chen, PH ;
Lin, CJ ;
Schölkopf, B .
APPLIED STOCHASTIC MODELS IN BUSINESS AND INDUSTRY, 2005, 21 (02) :111-136
[4]   Fast SVM training algorithm with decomposition on very large data sets [J].
Dong, JX ;
Krzyzak, A ;
Suen, CY .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2005, 27 (04) :603-618
[5]   A comparison of methods for multiclass support vector machines [J].
Hsu, CW ;
Lin, CJ .
IEEE TRANSACTIONS ON NEURAL NETWORKS, 2002, 13 (02) :415-425
[6]  
Jatinder S, ANAL INTRUSION DETEC
[7]   Analysis of Different Architectures of Neural Networks for Application in Intrusion Detection Systems [J].
Kukielka, Przemyslaw ;
Kotulski, Zbigniew .
2008 INTERNATIONAL MULTICONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (IMCSIT), VOLS 1 AND 2, 2008, :752-+
[8]  
Lundin E, 2002, TECHNICAL REPORT NO
[9]  
Mukkamala S, 2003, TOOLS ART INT P 15 I
[10]  
Paxson V, 1998, PROCEEDINGS OF THE SEVENTH USENIX SECURITY SYMPOSIUM, P31