Intrusion detection using a hybrid support vector machine based on entropy and TF-IDF

被引:0
作者
Chen, Rung-Ching [1 ]
Chen, Su-Ping [1 ]
机构
[1] Chaoyang Univ Technol, Dept Informat Management, Taichung, Taiwan
来源
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL | 2008年 / 4卷 / 02期
关键词
intrusion detection system; entropy; TF-IDF; support vector machine;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The main functions of an Intrusion Detection System (IDS) are to protect computer networks by analyzing and predicting the actions of processes. Though IDS has been developed for many years, the large number of alerts makes the system inefficient. In this paper, we proposed a classification method based on Support Vector Machines (SVM) with a weighted voting schema to detect intrusions. First, the entropy and TF-IDF (term frequency and inverse documents frequency) features are extracted from processes. Next, entropy and TF-IDF features are sent to the SVM model for learning and testing. Finally, we use a voting schema named Weighted Voting SVM (WV-SVM) to determine whether a process is an intrusion. Our experiments demonstrate improved efficiency.
引用
收藏
页码:413 / 424
页数:12
相关论文
共 26 条
  • [1] [Anonymous], LIBSVM LIB SUPPORT V
  • [2] [Anonymous], 2021, PATTERN RECOGN, DOI DOI 10.1201/9780138744274
  • [3] BALAJINATH B, 2001, COMPUT COMMUN, P1202
  • [4] BOTHA M, 2003, COMPUT SECUR, P423
  • [5] Web page classification based on a support vector machine using a weighted vote schema
    Chen, Rung-Ching
    Hsieh, Chung-Hsun
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2006, 31 (02) : 427 - 435
  • [6] Application of SVM and ANN for intrusion detection
    Chen, WH
    Hsu, SH
    Shen, HP
    [J]. COMPUTERS & OPERATIONS RESEARCH, 2005, 32 (10) : 2617 - 2634
  • [7] AN INTRUSION-DETECTION MODEL
    DENNING, DE
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) : 222 - 232
  • [8] An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks
    Depren, O
    Topallar, M
    Anarim, E
    Ciliz, MK
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2005, 29 (04) : 713 - 722
  • [9] FENG H, 2003, P IEEE S SEC PRIV
  • [10] Predicting the intrusion intentions by observing system call sequences
    Feng, L
    Guan, XH
    Guo, SG
    Gao, Y
    Liu, PN
    [J]. COMPUTERS & SECURITY, 2004, 23 (03) : 241 - 252