A novel hybrid KPCA and SVM with GA model for intrusion detection

被引:287
作者
Kuang, Fangjun [1 ,2 ]
Xu, Weihong [1 ,3 ]
Zhang, Siyang [2 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing 210018, Peoples R China
[2] Hunan Vocat Inst Safety & Technol, Dept Elect & Informat Engn, Changsha 410151, Peoples R China
[3] Changsha Univ Sci & Technol, Coll Comp & Commun Engn, Changsha 410077, Peoples R China
基金
中国国家自然科学基金;
关键词
Intrusion detection; Kernel principal component analysis; Kernel function; Support vector machines; Genetic algorithm; SUPPORT VECTOR MACHINES; DETECTION SYSTEM;
D O I
10.1016/j.asoc.2014.01.028
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A novel support vector machine (SVM) model combining kernel principal component analysis (KPCA) with genetic algorithm ( GA) is proposed for intrusion detection. In the proposed model, a multi-layer SVM classifier is adopted to estimate whether the action is an attack, KPCA is used as a preprocessor of SVM to reduce the dimension of feature vectors and shorten training time. In order to reduce the noise caused by feature differences and improve the performance of SVM, an improved kernel function (N-RBF) is proposed by embedding the mean value and the mean square difference values of feature attributes in RBF kernel function. GA is employed to optimize the punishment factor C, kernel parameters sigma and the tube size epsilon of SVM. By comparison with other detection algorithms, the experimental results show that the proposed model performs higher predictive accuracy, faster convergence speed and better generalization. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:178 / 184
页数:7
相关论文
共 28 条
[1]  
[Anonymous], 2010, Technical Report
[2]  
[Anonymous], 2000, ICML
[3]  
Chen Ran, 2010, Journal of Central South University (Science and Technology), V41, P1391
[4]  
Chen Z. G., 2008, WIRELESS COMMUNICATI, P1
[5]  
Chimphlee W, 2006, 2006 International Conference on Hybrid Information Technology, Vol 1, Proceedings, P329
[6]  
Ding M., 2009, Proceedings of the World Academy of Science, Engineering and Technology, V35, P288
[7]  
Fei Ren, 2008, 2008 International Conference on Computer Science and Software Engineering (CSSE 2008), P986, DOI 10.1109/CSSE.2008.811
[8]  
Goldberg G. E, 2005, GENETIC ALGORITHMS S
[9]   A novel intrusion detection system based on hierarchical clustering and support vector machines [J].
Horng, Shi-Jinn ;
Su, Ming-Yang ;
Chen, Yuan-Hsin ;
Kao, Tzong-Wann ;
Chen, Rong-Jian ;
Lai, Jui-Lin ;
Perkasa, Citra Dwi .
EXPERT SYSTEMS WITH APPLICATIONS, 2011, 38 (01) :306-313
[10]  
Jolliffe I.T., 1986, PRINCIPLE COMPONENT