Using weighted Support Vector Machine to address the imbalanced classes problem of Intrusion Detection System

被引:13
作者
Alabdallah, Alaeddin [1 ]
Awad, Mohammed [2 ]
机构
[1] An Najah Natl Univ, Fac E&IT, Comp Engn Dept, POB 7, Nablus, Palestine
[2] Arab Amer Univ, Fac E&IT, Comp Syst Engn Dept, POB 240, Jenin, Palestine
关键词
Intrusion detection system; Weighted Support Vector Machine; Stratified sampling; Cost function; NSL-KDD; EXTREME LEARNING-MACHINE;
D O I
10.3837/tiis.2018.10.027
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Improving the intrusion detection system (IDS) is a pressing need for cyber security world. With the growth of computer networks, there are constantly daily new attacks. Machine Learning (ML) is one of the most important fields which have great contribution to address the intrusion detection issues. One of these issues relates to the imbalance of the diverse classes of network traffic. Accuracy paradox is a result of training ML algorithm with imbalanced classes. Most of the previous efforts concern improving the overall accuracy of these models which is truly important. However, even they improved the total accuracy of the system; it fell in the accuracy paradox. The seriousness of the threat caused by the minor classes and the pitfalls of the previous efforts to address this issue is the motive for this work. In this paper, we consolidated stratified sampling, cost function and weighted Support Vector Machine (WSVM) method to address the accuracy paradox of ID problem. This model achieved good results of total accuracy and superior results in the small classes like the User-To-Remote and Remote-To-Local attacks using the improved version of the benchmark dataset KDDCup99 which is called NSL-KDD.
引用
收藏
页码:5143 / 5158
页数:16
相关论文
共 27 条
[1]  
Abdurrazaq M. N., 2014, P INF TECHN SYST INN
[2]  
Aggarwal C.C., 2015, Data Mining: The Textbook, DOI [10.1007/978-3-319-14142-8, DOI 10.1007/978-3-319-14142-8]
[3]   Analysis of KDD Dataset Attributes - Class wise For Intrusion Detection [J].
Aggarwal, Preeti ;
Sharma, Sudhir Kumar .
3RD INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTING 2015 (ICRTC-2015), 2015, 57 :842-851
[4]   A survey of network anomaly detection techniques [J].
Ahmed, Mohiuddin ;
Mahmood, Abdun Naser ;
Hu, Jiankun .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 :19-31
[5]   Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system [J].
Al-Yaseen, Wathiq Laftah ;
Othman, Zulaiha Ali ;
Nazri, Mohd Zakree Ahmad .
EXPERT SYSTEMS WITH APPLICATIONS, 2017, 67 :296-303
[6]  
Alejo R., 2008, P IB C PATT REC
[7]  
Anu S., 2016, ANAL PCA, V5
[8]   Fuzziness based semi-supervised learning approach for intrusion detection system [J].
Ashfaq, Rana Aamir Raza ;
Wang, Xi-Zhao ;
Huang, Joshua Zhexue ;
Abbas, Haider ;
He, Yu-Lin .
INFORMATION SCIENCES, 2017, 378 :484-497
[9]  
Bains J. K., 2013, INT J COMPUTER APPL, V67
[10]  
Bellovin S. M., 2004, P COMP SEC APPL C 20