Biased support vector machines and kernel methods for intrusion detection

被引:0
|
作者
Yendrapalli, K. [1 ]
Mukkamala, S. [1 ]
Sung, A. H. [1 ]
Ribeiro, B. [2 ]
机构
[1] New Mexico Inst Min & Technol, Dept Comp Sci, Socorro, NM 87801 USA
[2] Univ Coimbra, P-3030290 Coimbra, Portugal
来源
WORLD CONGRESS ON ENGINEERING 2007, VOLS 1 AND 2 | 2007年
关键词
intrusion detection; model selection; kernel machines; support vector machines;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper describes results concerning the robustness and generalization capabilities of kernel methods in detecting intrusions using network audit trails., We use traditional support vector machines (SVM), biased support vector machine (BSVM) and leave-otie out model selection for support vector machines (looms) for model selection. We also evaluate the impact of kernel type and parameter values on the accuracy of a support vector machine (SVM) performing intrusion classification. Through a variety of comparative experiments, it is found that SVM performs the best for detecting Normal and User to Super User, BSVM performs the best for Denial of Service attacks, and looms based on BSVM performs the best for Probe and Remote to Local. We show that classification accuracy vanes with the kernel type and the parameter values; thus, with appropriately chosen parameter values, intrusions can be detected by SVMs with higher accuracy and lower rates of false alarms.
引用
收藏
页码:321 / +
页数:2
相关论文
共 50 条
  • [1] Advanced support vector machines and kernel methods
    Sánchez, VD
    NEUROCOMPUTING, 2003, 55 (1-2) : 5 - 20
  • [2] Application of Improved Support Vector Machines in Intrusion Detection
    Zhang, Yongli
    Zhu, Yanwei
    2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 56 - 59
  • [3] Intrusion detection Based on Fuzzy support vector machines
    Du Hongle
    Teng Shaohua
    Zhu Qingfang
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 639 - +
  • [4] Intrusion detection with support vector machines and generative models
    Baras, JS
    Rabi, M
    INFORMATION SECURITY, PROCEEDINGS, 2002, 2433 : 32 - 47
  • [5] Intrusion Detection using An Ensemble of Support Vector Machines
    Kumar, G. Kishor
    Kumar, R. Raja
    Basha, M. Suleman
    Reddy, K. Nageswara
    JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES, 2019, : 266 - 275
  • [6] Intrusion Detection Model with Twin Support Vector Machines
    何俊
    郑世慧
    Journal of Shanghai Jiaotong University(Science), 2014, 19 (04) : 448 - 454
  • [7] Improving Intrusion Detection with Adaptive Support Vector Machines
    Macek, N.
    Dordevic, B.
    Timcenko, V.
    Bojovic, M.
    Milosavljevic, M.
    ELEKTRONIKA IR ELEKTROTECHNIKA, 2014, 20 (07) : 57 - 60
  • [8] Intrusion detection model with twin support vector machines
    He J.
    Zheng S.-H.
    Journal of Shanghai Jiaotong University (Science), 2014, 19 (04) : 448 - 454
  • [9] Kernel methods and support vector machines for handwriting recognition
    Ahmad, AR
    Khalid, M
    Yusof, R
    2002 STUDENT CONFERENCE ON RESEARCH AND DEVELOPMENT, PROCEEDINGS: GLOBALIZING RESEARCH AND DEVELOPMENT IN ELECTRICAL AND ELECTRONICS ENGINEERING, 2002, : 309 - 312
  • [10] Support vector machines and kernel methods -: The new generation of learning machines
    Cristianini, N
    Schölkopf, B
    AI MAGAZINE, 2002, 23 (03) : 31 - 41