An Intrusion Detection Algorithm Model Based on Extension Clustering Support Vector Machine

被引:4
|
作者
Zhao Rui [1 ]
Yu Yongquan [1 ]
Cheng Minjun [1 ]
机构
[1] Guangdong Univ Technol, Fac Comp, Guangzhou, Guangdong, Peoples R China
关键词
intrusion detection; extension clustering; support vector machine;
D O I
10.1109/AICI.2009.143
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intrusion detection technology is a key research direction in information technology. For intrusion detection method based support vector machine(SVM), there is a big obstacle that the amount of audit data for modeling is very large even for a small network scale, so it's impractical to directly train SVM using original training datasets. Selecting important features from input dataset leads to a simplification of the problem, however a defect caused is the lack of sparseness. All training data will become the support vectors of SVM, which causes the low intrusion detection speed. We propose a novel SVM intrusion detection algorithm model using the method of extension clustering which is utilized to obtain a subset including support vectors. Through this approximation, the training dataset is downsized and consequently the number of support vectors of ultimate SVM model is reduced, which will greatly help to improve the response time of intrusion detection. Comparing to others, the arithmetic model is simple implement and better performance. So it is worth applying and popularizing.
引用
收藏
页码:15 / 18
页数:4
相关论文
共 50 条
  • [21] A Weighted Support Vector Clustering Algorithm and its Application in Network Intrusion Detection
    Sun, Sheng
    Wang, YuanZhen
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL I, 2009, : 352 - +
  • [22] Decision Tree based Support Vector Machine for Intrusion Detection
    Mulay, Snehal A.
    Devale, P. R.
    Garje, G. V.
    2010 INTERNATIONAL CONFERENCE ON NETWORKING AND INFORMATION TECHNOLOGY (ICNIT 2010), 2010, : 59 - 63
  • [23] Intrusion Detection Method Based on Classify Support Vector Machine
    Gao, Meijuan
    Tian, Jingwen
    Xia, Mingping
    ICICTA: 2009 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION, VOL II, PROCEEDINGS, 2009, : 391 - 394
  • [24] An intrusion detection algorithm based on bag representation with ensemble support vector machine in cloud computing
    Wei, Jinxia
    Long, Chun
    Li, Jiawei
    Zhao, Jing
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (24):
  • [25] Intrusion Detection System Based on Immune Algorithm and Support Vector Machine in Wireless Sensor Network
    Chen, Yu Sheng
    Qin, Yu Sheng
    Xiang, Yu Gui
    Zhong, Jing Xi
    Jiao, Xu Long
    INFORMATION AND AUTOMATION, 2011, 86 : 372 - +
  • [26] Support vector machine based intrusion detection method combined with nonlinear dimensionality reduction algorithm
    Li, Xiaoping
    Sensors and Transducers, 2013, 159 (11): : 226 - 229
  • [27] Intrusion Detection System Based on Support Vector Machine Optimised with Cat Swarm Optimization Algorithm
    Idris, Suleiman
    Ishaq, Oyefolahan O.
    Juliana, Ndunagu N.
    2019 2ND INTERNATIONAL CONFERENCE OF THE IEEE NIGERIA COMPUTER CHAPTER (NIGERIACOMPUTCONF), 2019, : 70 - 77
  • [28] Research on Network Intrusion Detection Based on Support Vector Machine Optimized with Grasshopper Optimization Algorithm
    Ye, Zhiwei
    Sun, Yiheng
    Sun, Shuang
    Zhan, Sikai
    Yu, Han
    Yao, Quanfeng
    PROCEEDINGS OF THE 2019 10TH IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS - TECHNOLOGY AND APPLICATIONS (IDAACS), VOL. 1, 2019, : 378 - 383
  • [29] A Transductive Support Vector Machine Algorithm Based on Spectral Clustering
    Yu, Xu
    Yang, Jing
    Zhang, Jian-pei
    AASRI CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND BIOINFORMATICS, 2012, 1 : 384 - 388
  • [30] Implementation of Parallel Algorithm for Support Vector Machine applied to Intrusion Detection Systems
    Tarapore, N. Z.
    Kulkarni, D. B.
    Prasad, V. Kamakshi
    2016 INTERNATIONAL CONFERENCE ON COMPUTING, ANALYTICS AND SECURITY TRENDS (CAST), 2016, : 179 - 184