Computer Network Security Based On Support Vector Machine Approach

被引:0
作者
Somwang, Preecha [1 ]
Lilakiatsakun, Woraphon [1 ]
机构
[1] Mahanakorn Univ Technol, Fac Informat Sci & Technol, Nongchok Bangkok 10530, Thailand
来源
2011 11TH INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND SYSTEMS (ICCAS) | 2011年
关键词
Principal Component Analysis; Intrusion Detection System; Network Security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
At present, incidents of computer networks attack are significantly increasing therefore the effective Intrusion Detection Systems (IDS) are essential for information systems security. In order for the IDS to be effective, they have the capability of detecting new arrival attacks. Additionally, the correct detection rate should also be at high level whereas the low false positive detection rate is preferred. This paper proposes the new intrusion detection technique by using hybrid methods of unsupervised/supervised learning scheme. The proposed technique integrates the Principal Component Analysis (PCA) with the Support Vector Machine (SVM). The PCA is applied to reduce high dimensional data vectors and distance between vectors including its projection onto the subspace. SVM is then used to classify different groups of data, Normal and Anomalous. The results show that the proposed technique can improve the performance of anomaly intrusion detection, the intrusion detection rate and generate fewer false alarms.
引用
收藏
页码:155 / 160
页数:6
相关论文
共 50 条
  • [21] A Novel Approach of intrusion detection system design for computer network security
    Yi, Julan
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING 2015 (ICMMCCE 2015), 2015, 39 : 3021 - 3025
  • [22] Study on genetic algorithm optimization for support vector machine in network intrusion detection
    Wang, Xiaoqiang
    Advances in Information Sciences and Service Sciences, 2012, 4 (02): : 282 - 288
  • [23] Search on Method of Netwok Intrusion Detection Based on Support Vector Machine with Pre-extracting Support Vector
    Yu, Shengchen
    Sun, Limin
    Xue, Yang
    Guo, Hui
    Wang, Xiaoju
    Mei, Qunli
    Zhang, Lianjun
    ENGINEERING SOLUTIONS FOR MANUFACTURING PROCESSES, PTS 1-3, 2013, 655-657 : 1787 - +
  • [24] Computer Network Security: Then and Now
    Witzke, Edward L.
    2016 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2016, : 233 - 239
  • [25] Research on Network Intrusion Detection Based on Support Vector Machine Optimized with Pigeon-inspired Optimization Algorithm
    Sun, Yiheng
    Ye, Zhiwei
    Wang, Chunzhi
    Yan, Lingyu
    Wang, Ruoxi
    PROCEEDINGS OF THE 2018 IEEE 4TH INTERNATIONAL SYMPOSIUM ON WIRELESS SYSTEMS WITHIN THE INTERNATIONAL CONFERENCES ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS (IDAACS-SWS), 2018, : 62 - 67
  • [26] Risk Assessment in Electrical Power Network Planning Project Based on Principal Component Analysis and Support Vector Machine
    Sun, Wei
    Ma, Yue
    2008 7TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-23, 2008, : 5268 - 5271
  • [27] Research on computer network security evaluation based on image recognition and neural network
    Wang, Zilong
    Shi, Lin
    Chen, Ning
    Chen, Jie
    JOURNAL OF ELECTRONIC IMAGING, 2023, 32 (01)
  • [28] Discussion on Log-based Computer Network Security Control
    Ni, Min
    2013 THE FOURTH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION AND EDUCATION APPLICATION (ICEA 2013), PT 1, 2013, 30 : 25 - 29
  • [29] Study on the computer network security evaluation based on GABP algorithm
    Qiao, Xiaolin
    Boletin Tecnico/Technical Bulletin, 2017, 55 (18): : 497 - 504
  • [30] TEACHING NETWORK SECURITY THROUGH SIGNATURE ANALYSIS OF COMPUTER NETWORK ATTACKS
    Chou, Te-Shun
    2012 ASEE ANNUAL CONFERENCE, 2012,