An Intrusion Detection Algorithm Model Based on Extension Clustering Support Vector Machine

被引:4
作者
Zhao Rui [1 ]
Yu Yongquan [1 ]
Cheng Minjun [1 ]
机构
[1] Guangdong Univ Technol, Fac Comp, Guangzhou, Guangdong, Peoples R China
来源
2009 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND COMPUTATIONAL INTELLIGENCE, VOL I, PROCEEDINGS | 2009年
关键词
intrusion detection; extension clustering; support vector machine;
D O I
10.1109/AICI.2009.143
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intrusion detection technology is a key research direction in information technology. For intrusion detection method based support vector machine(SVM), there is a big obstacle that the amount of audit data for modeling is very large even for a small network scale, so it's impractical to directly train SVM using original training datasets. Selecting important features from input dataset leads to a simplification of the problem, however a defect caused is the lack of sparseness. All training data will become the support vectors of SVM, which causes the low intrusion detection speed. We propose a novel SVM intrusion detection algorithm model using the method of extension clustering which is utilized to obtain a subset including support vectors. Through this approximation, the training dataset is downsized and consequently the number of support vectors of ultimate SVM model is reduced, which will greatly help to improve the response time of intrusion detection. Comparing to others, the arithmetic model is simple implement and better performance. So it is worth applying and popularizing.
引用
收藏
页码:15 / 18
页数:4
相关论文
共 14 条
  • [1] A tutorial on Support Vector Machines for pattern recognition
    Burges, CJC
    [J]. DATA MINING AND KNOWLEDGE DISCOVERY, 1998, 2 (02) : 121 - 167
  • [2] Glacinto G, 2002, INT C PATT RECOG, P390, DOI 10.1109/ICPR.2002.1048321
  • [3] Gunn S. R., 1998, SUPPORT VECTOR MACHI
  • [4] GUPTA H, EXPT EVALUATION LINE
  • [5] Hall P. M., 1998, BMVC 98. Proceedings of the Ninth British Machine Vision Conference, P286
  • [6] KIM BJ, 2005, P 4 ANN ACIS INT C C
  • [7] Stateful intrusion detection for high-speed networks
    Kruegel, C
    Valeur, F
    Vigna, G
    Kemmerer, R
    [J]. 2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, : 285 - 293
  • [8] LI H, 2003, J COMPUTER RES DEV, P799
  • [9] Defending yourself: The role of intrusion detection systems
    McHugh, J
    Christie, A
    Allen, J
    [J]. IEEE SOFTWARE, 2000, 17 (05) : 42 - +
  • [10] Identifying important features for intrusion detection using support vector machines and neural networks
    Sung, AH
    Mukkamala, S
    [J]. 2003 SYMPOSIUM ON APPLICATIONS AND THE INTERNET, PROCEEDINGS, 2003, : 209 - 216