Network intrusion detection system using random projection technique

被引:0
|
作者
Deng, HM [1 ]
Zeng, QA [1 ]
Agrawal, DP [1 ]
机构
[1] Univ Cincinnati, Ctr Distributed & Mobile Comp, ECECS Dept, Cincinnati, OH 45221 USA
来源
SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2 | 2003年
关键词
intrusion detection; support vector machine; random projection;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a novel and practical intrusion detection system using random projection technique, which can be used in the situation of very high dimensional dataset. To the best of our knowledge, this is the first time applying random projection technique into the intrusion detection areas. The main idea of our proposed intrusion detection system is to use random projection technique projecting the high-dimensional dataset to a lower dimension, and then do the intrusion detection. We present a methodology of using a Support Vector Machine (SVM) classifier to build the intrusion detection model. The approach is applied to a set Of benchmark data KDDCup99, and the experimental results show that the proposed intrusion detection system can do the intrusion detection efficiently with less computational complexity and system resource requirements.
引用
收藏
页码:10 / 16
页数:7
相关论文
共 50 条
  • [1] A hybrid network intrusion detection technique using random forests
    Zhang, Jiong
    Zulkernine, Mohammad
    FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 262 - +
  • [2] Intrusion detection system using Anomaly technique in Wireless Sensor Network
    Pandey, Sushant Kumar
    Kumar, Prabhat
    Singh, Jyoti Prakash
    Singh, M. P.
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 611 - 615
  • [3] Random Forest Modeling for Network Intrusion Detection System
    Farnaaz, Nabila
    Jabbar, M. A.
    TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 : 213 - 217
  • [4] ANIDS: Anomaly Network Intrusion Detection System Using Hierarchical Clustering Technique
    Sangve, Sunil M.
    Thool, Ravindra C.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DATA ENGINEERING AND COMMUNICATION TECHNOLOGY, ICDECT 2016, VOL 1, 2017, 468 : 121 - 129
  • [5] An Efficient Network Log Anomaly Detection System using Random Projection Dimensionality Reduction
    Juvonen, Antti
    Hamalainen, Timo
    2014 6TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2014,
  • [6] Network Intrusion Detection System Using Random Forest and Decision Tree Machine Learning Techniques
    Bhavani, T. Tulasi
    Rao, M. Kameswara
    Reddy, A. Manohar
    FIRST INTERNATIONAL CONFERENCE ON SUSTAINABLE TECHNOLOGIES FOR COMPUTATIONAL INTELLIGENCE, 2020, 1045 : 637 - 643
  • [7] An Analysis of Random Forest Algorithm Based Network Intrusion Detection System
    Aung, Yi Yi
    Min, Myat Myat
    2017 18TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNDP 2017), 2017, : 127 - 132
  • [8] Network Intrusion Detection Using a Stochastic Resonance CFAR Technique
    He, Di
    Leung, Henry
    CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2009, 28 (03) : 361 - 375
  • [9] Network Intrusion Detection Using a Stochastic Resonance CFAR Technique
    Di He
    Henry Leung
    Circuits, Systems & Signal Processing, 2009, 28 : 361 - 375
  • [10] Intrusion Detection System Using Bayesian Network Modeling
    Alocious, Chaminda
    Abouzakhar, Nasser
    Xiao, Hannan
    Christianson, Bruce
    PROCEEDINGS OF THE 13TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2014), 2014, : 223 - 232