An effective intrusion detection framework based on SVM with feature augmentation

被引:162
|
作者
Wang, Huiwen [1 ,2 ]
Gu, Jie [1 ]
Wang, Shanshan [1 ]
机构
[1] Beihang Univ, Sch Econ & Management, Beijing 100191, Peoples R China
[2] Beijing Key Lab Emergence Support Simulat Technol, Beijing 100191, Peoples R China
基金
国家高技术研究发展计划(863计划);
关键词
Intrusion detection; Marginal density ratios transformation; Network security; Support vector machine; FEATURE-SELECTION APPROACH; SUPPORT VECTOR MACHINES; DETECTION SYSTEM; ANOMALY DETECTION; OPTIMIZATION; CLASSIFIER; ALGORITHM; MODEL;
D O I
10.1016/j.knosys.2017.09.014
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Network security is becoming increasingly important in our daily lives not only for organizations but also for individuals. Intrusion detection systems have been widely used to prevent information from being compromised, and various machine-learning techniques have been proposed to enhance the performance of intrusion detection systems. However, higher-quality training data is an essential determinant that could improve detection performance. It is well known that the marginal density ratio is the most powerful univariate classifier. In this paper, we propose an effective intrusion detection framework based on a support vector machine (SVM) with augmented features. More specifically, we implement the logarithm marginal density ratios transformation to form the original features with the goal of obtaining new and better-quality transformed features that can greatly improve the detection capability of an SVM-based detection model. The NSL-KDD dataset is used to evaluate the proposed method, and the empirical results show that it achieves a better and more robust performance than existing methods in terms of accuracy, detection rate, false alarm rate and training speed. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:130 / 139
页数:10
相关论文
共 50 条
  • [41] Optimized Feature Selection with k-Means Clustered Triangle SVM for Intrusion Detection
    Ashok, R.
    Lakshmi, A. Jaya
    Rani, G. Devi Vasudha
    Kumar, Madarapu Naresh
    2011 THIRD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2011, : 23 - 27
  • [42] AN ONLINE UNSUPERVISED INTRUSION DETECTION SYSTEM BASED-ON SVM
    Liang, Hu
    Nurbol
    Lin, Lin
    Kuo, Zhao
    PROCEEDINGS OF 2009 2ND IEEE INTERNATIONAL CONFERENCE ON BROADBAND NETWORK & MULTIMEDIA TECHNOLOGY, 2009, : 438 - 442
  • [43] Research On SVM Detection Of Network Intrusion Based On Vulnerability Scanning
    Yang, Jie
    SEVENTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III, 2008, : 1286 - 1291
  • [44] SVM-DT-Based Adaptive and Collaborative Intrusion Detection
    Teng, Shaohua
    Wu, Naiqi
    Zhu, Haibin
    Teng, Luyao
    Zhang, Wei
    IEEE-CAA JOURNAL OF AUTOMATICA SINICA, 2018, 5 (01) : 108 - 118
  • [45] Intrusion detection technique using Coarse Gaussian SVM
    Bhati, Bhoopesh Singh
    Rai, C. S.
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2021, 12 (01) : 27 - 32
  • [46] A Filter Feature Selection Algorithm Based on Mutual Information for Intrusion Detection
    Zhao, Fei
    Zhao, Jiyong
    Niu, Xinxin
    Luo, Shoushan
    Xin, Yang
    APPLIED SCIENCES-BASEL, 2018, 8 (09):
  • [47] Introducing a Classification Model Based on SVM for Network Intrusion Detection
    Dastfal, Ghodratolah
    Nejatian, Samad
    Parvin, Hamid
    Rezaie, Vahideh
    ADVANCES IN SOFT COMPUTING, MICAI 2017, PT I, 2018, 10632 : 54 - 66
  • [48] Cloud Intrusion Detection System Based on SVM
    Alheeti K.M.A.
    Lateef A.A.A.
    Alzahrani A.
    Imran A.
    Al Dosary D.
    International Journal of Interactive Mobile Technologies, 2023, 17 (11) : 101 - 114
  • [49] UTTAMA: An Intrusion Detection System Based on Feature Clustering and Feature Transformation
    Nagaraja, Arun
    Uma, B.
    Gunupudi, Rajesh kumar
    FOUNDATIONS OF SCIENCE, 2020, 25 (04) : 1049 - 1075
  • [50] Application of SVM and ANN for intrusion detection
    Chen, WH
    Hsu, SH
    Shen, HP
    COMPUTERS & OPERATIONS RESEARCH, 2005, 32 (10) : 2617 - 2634