An effective intrusion detection framework based on SVM with feature augmentation

被引:174
作者
Wang, Huiwen [1 ,2 ]
Gu, Jie [1 ]
Wang, Shanshan [1 ]
机构
[1] Beihang Univ, Sch Econ & Management, Beijing 100191, Peoples R China
[2] Beijing Key Lab Emergence Support Simulat Technol, Beijing 100191, Peoples R China
基金
国家高技术研究发展计划(863计划);
关键词
Intrusion detection; Marginal density ratios transformation; Network security; Support vector machine; FEATURE-SELECTION APPROACH; SUPPORT VECTOR MACHINES; DETECTION SYSTEM; ANOMALY DETECTION; OPTIMIZATION; CLASSIFIER; ALGORITHM; MODEL;
D O I
10.1016/j.knosys.2017.09.014
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Network security is becoming increasingly important in our daily lives not only for organizations but also for individuals. Intrusion detection systems have been widely used to prevent information from being compromised, and various machine-learning techniques have been proposed to enhance the performance of intrusion detection systems. However, higher-quality training data is an essential determinant that could improve detection performance. It is well known that the marginal density ratio is the most powerful univariate classifier. In this paper, we propose an effective intrusion detection framework based on a support vector machine (SVM) with augmented features. More specifically, we implement the logarithm marginal density ratios transformation to form the original features with the goal of obtaining new and better-quality transformed features that can greatly improve the detection capability of an SVM-based detection model. The NSL-KDD dataset is used to evaluate the proposed method, and the empirical results show that it achieves a better and more robust performance than existing methods in terms of accuracy, detection rate, false alarm rate and training speed. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:130 / 139
页数:10
相关论文
共 51 条
[1]   A general modular framework for gene set enrichment analysis [J].
Ackermann, Marit ;
Strimmer, Korbinian .
BMC BIOINFORMATICS, 2009, 10
[2]   Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm [J].
Ambusaidi, Mohammed A. ;
He, Xiangjian ;
Nanda, Priyadarsi ;
Tan, Zhiyuan .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (10) :2986-2998
[3]   A new intrusion detection method based on SVM with minimum within-class scatter [J].
An, Wenjuan ;
Liang, Mangui .
SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (09) :1064-1074
[4]  
[Anonymous], 2011, WORKSHOP BUILDING AN, DOI DOI 10.1145/1978672.1978676
[5]  
[Anonymous], TECHNICAL REPORT
[6]  
[Anonymous], 2009, S COMP INT SEC DEF A
[7]   An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization [J].
Bamakan, Seyed Mojtaba Hosseini ;
Wang, Huadong ;
Tian Yingjie ;
Shi, Yong .
NEUROCOMPUTING, 2016, 199 :90-102
[8]   LAWRA: a layered wrapper feature selection approach for network attack detection [J].
Bhattacharya, Sangeeta ;
Selvakumar, Subramanian .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) :3459-3468
[9]  
Bifet A., 2011, P 15 PAC AS C KNOWL
[10]  
Chang C.-C., 2007, ACM T INTELL SYST TE, V2