Improving the Computer Network Intrusion Detection Performance Using the Relevance Vector Machine with Chebyshev Chaotic Map

被引:0
作者
He, Di [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Elect Engn, Shanghai 200240, Peoples R China
来源
2011 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS) | 2011年
关键词
intrusion detection; relevance vector machine (RVM); support vector machine (SVM); Chebyshev chaotic map;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A novel computer network intrusion detection approach based on the relevance vector machine (RVM) classification is proposed, where a Chebyshev chaotic map is introduced as the inner training noise signal. According to the known distribution property of the Chebyshev map, the iteration process of RVM classifier can be derived and be realized easily. Compared with the support vector machine (SVM) classification method, it can be found from the simulation results that the proposed approach can reach higher detection probabilities under different kinds of intrusion signals, and the corresponding computational complexity can be reduced efficiently, which guarantee the reliability of this RVM-based approach with Chebyshev chaotic map.
引用
收藏
页码:1584 / 1587
页数:4
相关论文
共 14 条
  • [1] Nonlinear system identification with composite relevance vector machines
    Camps-Valls, Gustavo
    Martinez-Ramon, Manel
    Rojo-Alvarez, Jose Luis
    Munoz-Mari, Jordi
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2007, 14 (04) : 279 - 282
  • [2] Probabilistic Classification Vector Machines
    Chen, Huanhuan
    Tino, Peter
    Yao, Xin
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS, 2009, 20 (06): : 901 - 914
  • [3] Comparison of two feature selection methods in Intrusion Detection Systems
    Fadaeieslam, M. J.
    Minaei-Bidgoli, B.
    Fathy, M.
    Soryani, M.
    [J]. 2007 CIT: 7TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2007, : 83 - +
  • [4] Blind Equalization Method Based on Sparse Bayesian Learning
    Hwang, Kyuho
    Choi, Sooyong
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2009, 16 (04) : 315 - 318
  • [5] Intrusion detection: A brief history and overview
    Kemmerer, D
    Vigna, G
    [J]. COMPUTER, 2002, : 27 - 30
  • [6] Lu Changhua, 2006, Proceedings of the 2006 IEEE Signal Processing Society Workshop, P135
  • [7] Bayesian kernel methods for analysis of functional neuroimages
    Lukic, Ana S.
    Wernick, Miles N.
    Tzikas, Dimitris G.
    Chen, Xu
    Likas, Aristidis
    Galatsanos, Nikolas P.
    Yang, Yongyi
    Zhao, Fuqiang
    Strother, Stephen C.
    [J]. IEEE TRANSACTIONS ON MEDICAL IMAGING, 2007, 26 (12) : 1613 - 1624
  • [8] An overview of recent advances in intrusion detection
    Marhusin, Mohd Fadzli
    Cornforth, David
    Larkin, Henry
    [J]. 2008 IEEE 8TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2008, : 432 - 437
  • [9] Quiñonero-Candela J, 2002, INT CONF ACOUST SPEE, P985
  • [10] Tipping ME, 2000, ADV NEUR IN, V12, P652