Network intrusion detection model based on fuzzy support vector machine

被引:4
|
作者
Long, Yanjun [1 ]
Ouyang, Jianquan [2 ]
Sun, Xinwen [1 ]
机构
[1] Network Information Center of Yongzhou Vocational Technical College, Yongzhou Hunan, China
[2] College of Information Engineering of Xiangtan University, Xiangtan Hunan, China
关键词
Fuzzy membership - Fuzzy support vector machines - Intrusion detection algorithms - Intrusion detection modules - Intrusion Detection Systems - Kernel function - Network intrusion detection - Network intrusions;
D O I
10.4304/jnw.8.6.1387-1394
中图分类号
学科分类号
摘要
Network intrusion detection is of great importance in the research field of information security in computer networks. In this paper, we concentrate on how to automatically detect the network intrusion behavior utilizing fuzzy support vector machine. After analyzing the related works of the proposed paper, we introduce the main characterics of fuzzy support vector machine, and demonstrate its formal description in detail. Next, the proposed intrusion detection system is organized as five modules, which are Data source, AAA protocol, FSVM module located in local computer, Guest computer and Terminals. Particularly, the intrusion detection module is constructed by four sections, which are data gathering section, data pre-processing section, intrusion detecting section and decision response section. Then, the intrusion detection algorithm based on fuzzy support vector machine is implemented by training process and testing process. Utilizing this algorithm, a sample in testing data can be judged whether it is belonged to network intrusion behavior. Finally, experimental results verify the effectiveness of our method comparing with other methods under different metric. © 2013 ACADEMY PUBLISHER.
引用
收藏
页码:1387 / 1394
相关论文
共 50 条
  • [21] Network intrusion detection algorithm using modified support vector machine
    Hong, D. (dear_red9@163.com), 2012, Advanced Institute of Convergence Information Technology, Myoungbo Bldg 3F,, Bumin-dong 1-ga, Seo-gu, Busan, 602-816, Korea, Republic of (04):
  • [22] Design network intrusion detection system using support vector machine
    Ajdani, Mahdi
    Ghaffary, Hamidreza
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 34 (03)
  • [23] Decision Tree based Support Vector Machine for Intrusion Detection
    Mulay, Snehal A.
    Devale, P. R.
    Garje, G. V.
    2010 INTERNATIONAL CONFERENCE ON NETWORKING AND INFORMATION TECHNOLOGY (ICNIT 2010), 2010, : 59 - 63
  • [24] Intrusion Detection Method Based on Classify Support Vector Machine
    Gao, Meijuan
    Tian, Jingwen
    Xia, Mingping
    ICICTA: 2009 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION, VOL II, PROCEEDINGS, 2009, : 391 - 394
  • [25] Intrusion Detection System Based on Immune Algorithm and Support Vector Machine in Wireless Sensor Network
    Chen, Yu Sheng
    Qin, Yu Sheng
    Xiang, Yu Gui
    Zhong, Jing Xi
    Jiao, Xu Long
    INFORMATION AND AUTOMATION, 2011, 86 : 372 - +
  • [26] Wireless Sensor Network for Community Intrusion Detection System Based on Classify Support Vector Machine
    Tian, Jingwen
    Gao, Meijuan
    Zhou, Shiru
    ICIA: 2009 INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION, VOLS 1-3, 2009, : 1192 - 1196
  • [27] Research on Network Intrusion Detection Based on Support Vector Machine Optimized with Grasshopper Optimization Algorithm
    Ye, Zhiwei
    Sun, Yiheng
    Sun, Shuang
    Zhan, Sikai
    Yu, Han
    Yao, Quanfeng
    PROCEEDINGS OF THE 2019 10TH IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS - TECHNOLOGY AND APPLICATIONS (IDAACS), VOL. 1, 2019, : 378 - 383
  • [28] A Novel Intrusion Detection Scheme Using Support Vector Machine Fuzzy Network for Mobile Ad Hoc Networks
    Li, Huike
    Gu, Daquan
    PROCEEDINGS OF THE 2009 SECOND PACIFIC-ASIA CONFERENCE ON WEB MINING AND WEB-BASED APPLICATION, 2009, : 47 - +
  • [29] Network Intrusion Detection System using Genetic Network Programming with Support Vector Machine
    Sujatha, Kola P.
    Priya, Suba C.
    Kannan, A.
    PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI'12), 2012, : 645 - 649
  • [30] Network-based intrusion detection with support vector machines
    Kim, DS
    Park, JS
    INFORMATION NETWORKING: NETWORKING TECHNOLOGIES FOR ENHANCED INTERNET SERVICES, 2003, 2662 : 747 - 756