Network intrusion detection model based on fuzzy support vector machine

被引:4
|
作者
Long, Yanjun [1 ]
Ouyang, Jianquan [2 ]
Sun, Xinwen [1 ]
机构
[1] Network Information Center of Yongzhou Vocational Technical College, Yongzhou Hunan, China
[2] College of Information Engineering of Xiangtan University, Xiangtan Hunan, China
关键词
Fuzzy membership - Fuzzy support vector machines - Intrusion detection algorithms - Intrusion detection modules - Intrusion Detection Systems - Kernel function - Network intrusion detection - Network intrusions;
D O I
10.4304/jnw.8.6.1387-1394
中图分类号
学科分类号
摘要
Network intrusion detection is of great importance in the research field of information security in computer networks. In this paper, we concentrate on how to automatically detect the network intrusion behavior utilizing fuzzy support vector machine. After analyzing the related works of the proposed paper, we introduce the main characterics of fuzzy support vector machine, and demonstrate its formal description in detail. Next, the proposed intrusion detection system is organized as five modules, which are Data source, AAA protocol, FSVM module located in local computer, Guest computer and Terminals. Particularly, the intrusion detection module is constructed by four sections, which are data gathering section, data pre-processing section, intrusion detecting section and decision response section. Then, the intrusion detection algorithm based on fuzzy support vector machine is implemented by training process and testing process. Utilizing this algorithm, a sample in testing data can be judged whether it is belonged to network intrusion behavior. Finally, experimental results verify the effectiveness of our method comparing with other methods under different metric. © 2013 ACADEMY PUBLISHER.
引用
收藏
页码:1387 / 1394
相关论文
共 50 条
  • [41] Analysis of Support Vector Machine-based Intrusion Detection Techniques
    Bhati, Bhoopesh Singh
    Rai, C. S.
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2020, 45 (04) : 2371 - 2383
  • [42] Intrusion Detection Based on Support Vector Machine Divided Up by Clusters
    Li, Yong
    Qian, Yuwen
    2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL VII, 2010, : 284 - 286
  • [43] Analysis of Support Vector Machine-based Intrusion Detection Techniques
    Bhoopesh Singh Bhati
    C. S. Rai
    Arabian Journal for Science and Engineering, 2020, 45 : 2371 - 2383
  • [44] Intrusion Detection Based on Support Vector Machine Divided Up by Clusters
    Li, Yong
    Qian, Yuwen
    2011 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION AND INDUSTRIAL APPLICATION (ICIA2011), VOL II, 2011, : 283 - 285
  • [45] A New Random Forest and Support Vector Machine-based Intrusion Detection Model in Networks
    Prasenjit Dey
    Dhananjoy Bhakta
    National Academy Science Letters, 2023, 46 : 471 - 477
  • [46] The Intrusion Detection Model based on Parallel Multi - Artificial Bee Colony and Support Vector Machine
    Li, Long
    Zhang, Shaowei
    Zhang, Yongchao
    Chang, Liang
    Gu, Tianlong
    2019 ELEVENTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTATIONAL INTELLIGENCE (ICACI 2019), 2019, : 308 - 313
  • [47] Support vector classifiers and network intrusion detection
    Mill, J
    Inoue, A
    2004 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, VOLS 1-3, PROCEEDINGS, 2004, : 407 - 410
  • [48] A New Random Forest and Support Vector Machine-based Intrusion Detection Model in Networks
    Dey, Prasenjit
    Bhakta, Dhananjoy
    NATIONAL ACADEMY SCIENCE LETTERS-INDIA, 2023, 46 (05): : 471 - 477
  • [49] A wavelet transform based support vector machine ensemble algorithm and its application in network intrusion detection
    Nan, Lin
    Xiang Chun-zhi
    2014 FIFTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND ENGINEERING APPLICATIONS (ISDEA), 2014, : 109 - 113
  • [50] Clustering Detection Method of Network Intrusion Feature Based on Support Vector Machine and LCA Block Algorithm
    Jie Zhang
    Jinguang Sun
    Hua He
    Wireless Personal Communications, 2022, 127 : 599 - 613