Hierarchical Core Vector Machines for Network Intrusion Detection

被引:0
|
作者
Chen, Ye [1 ]
Pang, Shaoning [1 ]
Kasabov, Nikola [1 ]
Ban, Tao [2 ]
Kadobayashi, Youki [2 ]
机构
[1] Auckland Univ Technol, Knowledge Engn & Discover Res Inst, Private Bag 92006, Auckland 1020, New Zealand
[2] Natl Inst Informat & Commun Technol, Informat Secur Res Ctr, Koganei, Tokyo 1848795, Japan
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
For labelling network intrusions as they state hierarchical multi-label structure, we develop a hierarchical core vector machines (HCVM) algorithm for high-speed network intrusion detection via hierarchical multi-label classification of network data. HCVM models a multi-label hierarchy into a data Hyper-Sphere constructed by numbers of core vector machines (CVM). As the CVMs in an HCVM are separating, encompassing and overlapping with each other, which forms naturally a tree structure representing the multi-label hierarchy encoded. Provided an unlabelled sample, the HCVM seeks a CVM enclosing the sample, and multiply label the sample according to the MEB's position in the hierarchy. The proposed HCVM method has been examined on KDD'99 and the result shows that the proposed HCVM has significant improvement over previously published benchmark works. HCVM improves U2R accuracy from 13.2% to 82.7% and R2L from 8.4% to 45.9%, as compared to the winner of KDD'99. In particular, the efficiency of HCVM is highlighted, as the computational time stays steady while the size of training data exponentially manifolds.
引用
收藏
页码:520 / +
页数:2
相关论文
共 50 条
  • [1] Network-based intrusion detection with support vector machines
    Kim, DS
    Park, JS
    INFORMATION NETWORKING: NETWORKING TECHNOLOGIES FOR ENHANCED INTERNET SERVICES, 2003, 2662 : 747 - 756
  • [2] Application of weighted support vector machines to network intrusion detection
    Jia, YS
    Jia, CY
    Qi, HW
    SHAPING BUSINESS STRATEGY IN A NETWORKED WORLD, VOLS 1 AND 2, PROCEEDINGS, 2004, : 1025 - 1029
  • [3] A new intrusion detection system using support vector machines and hierarchical clustering
    Latifur Khan
    Mamoun Awad
    Bhavani Thuraisingham
    The VLDB Journal, 2007, 16 : 507 - 521
  • [4] A new intrusion detection system using support vector machines and hierarchical clustering
    Khan, Latifur
    Awad, Mamoun
    Thuraisingham, Bhavani
    VLDB JOURNAL, 2007, 16 (04): : 507 - 521
  • [5] A novel intrusion detection system based on hierarchical clustering and support vector machines
    Horng, Shi-Jinn
    Su, Ming-Yang
    Chen, Yuan-Hsin
    Kao, Tzong-Wann
    Chen, Rong-Jian
    Lai, Jui-Lin
    Perkasa, Citra Dwi
    EXPERT SYSTEMS WITH APPLICATIONS, 2011, 38 (01) : 306 - 313
  • [6] Integration of rough sets and support vector machines for network intrusion detection
    Huang, Jih-Jeng
    Chen, Chin-Yi
    JOURNAL OF INDUSTRIAL AND PRODUCTION ENGINEERING, 2014, 31 (07) : 425 - 432
  • [7] Intrusion Detection For Controller Area Network Using Support Vector Machines
    Tanksale, Vinayak
    2019 IEEE 16TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS WORKSHOPS (MASSW 2019), 2019, : 121 - 126
  • [8] Nested One-Class Support Vector Machines for Network Intrusion Detection
    Quoc Thong Nguyen
    Kim Phuc Tran
    Castagliola, Philippe
    Truong Thu Huong
    Minh Kha Nguyen
    Lardjane, Salim
    2018 IEEE SEVENTH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND ELECTRONICS (IEEE ICCE 2018), 2018, : 7 - 12
  • [9] An adaptive network intrusion detection method based on PCA and support vector machines
    Xu, X
    Wang, XN
    ADVANCED DATA MINING AND APPLICATIONS, PROCEEDINGS, 2005, 3584 : 696 - 703
  • [10] Hybrid hierarchical network intrusion detection
    Yang, Hong-Yu
    Xie, Li-Xia
    PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 2702 - +