AN INTRUSION DETECTION METHOD BASED ON KICA AND SVM

被引:1
|
作者
Li, Yuancheng [1 ]
Wang, Zhongqiang [1 ]
Ma, Yinglong [1 ]
机构
[1] N China Elect Power Univ, Dept Comp Sci & Technol, Beijing, Peoples R China
关键词
KICA; SVM; IDS; kernel method; Feature extraction;
D O I
10.1109/WCICA.2008.4593255
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, support vector machine (SVM) has become a popular tool in classification, feature extraction is an important step in developing a successful classifier. In this paper, a novel intrusion detection method based on KICA and SVM is proposed. In the proposed method, KICA is applied to extraction features from the raw data set captured from the network, and these features extracted by KICA is used as input data of SVM, which can learn from the input data. Based on the good performance of SVM in generalization, experimental results show that this model can not only detect existed attacks but also new attacks, even the accuracy is improved remarkably.
引用
收藏
页码:2141 / 2144
页数:4
相关论文
共 50 条
  • [1] An intrusion detection method based on SVM and KPCA
    Li, Yuan-Cheng
    Wang, Zhong-Qiang
    2007 INTERNATIONAL CONFERENCE ON WAVELET ANALYSIS AND PATTERN RECOGNITION, VOLS 1-4, PROCEEDINGS, 2007, : 1462 - 1466
  • [2] Method of Intrusion Detection System Based on SVM
    Jia, Yanru
    Peng, Jian
    PROGRESS IN INTELLIGENCE COMPUTATION AND APPLICATIONS, 2008, : 341 - 344
  • [3] Intrusion detection method based on KFDA-SVM
    Wei, Yu-Xin
    Wu, Mu-Qing
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2007, 30 (SUPPL. 1): : 27 - 31
  • [4] A method of SVM with Normalization in Intrusion Detection
    Li, Weijun
    Liu, Zhenyu
    2011 2ND INTERNATIONAL CONFERENCE ON CHALLENGES IN ENVIRONMENTAL SCIENCE AND COMPUTER ENGINEERING (CESCE 2011), VOL 11, PT A, 2011, 11 : 256 - 262
  • [5] An intrusion detection method based on WPSO-SVM and KPCA
    Li, Lei
    Liu, Kongyuan
    Journal of Information and Computational Science, 2014, 11 (05): : 1403 - 1410
  • [6] An intrusion detection method based on rough set and SVM algorithm
    Hong, P
    Zhang, DN
    Wu, TF
    2004 INTERNATIONAL CONFERENCE ON COMMUNICATION, CIRCUITS, AND SYSTEMS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEMS, 2004, : 1127 - 1130
  • [7] A New Intrusion Detection Method Based on BPSO-SVM
    Ma, Jing
    Liu, Xingwei
    Liu, Sijia
    PROCEEDINGS OF THE 2008 INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN, VOL 1, 2008, : 473 - 477
  • [8] Ear Identification Based on KICA and SVM
    Wu He-lei
    Wang Qian
    Shen Hua-jun
    Hu Ling-yan
    PROCEEDINGS OF THE 2009 WRI GLOBAL CONGRESS ON INTELLIGENT SYSTEMS, VOL IV, 2009, : 414 - 417
  • [9] Improvement Intrusion Detection Based on SVM
    Zhao, Jian-hua
    Li, Wei-hua
    INFORMATION COMPUTING AND APPLICATIONS, PT 2, 2012, 308 : 53 - 60
  • [10] SVM Based Intrusion Detection Method with Nonlinear Scaling and Feature Selection
    Zhang, Fei
    Zhen, Peining
    Jing, Dishan
    Tang, Xiaotang
    Chen, Hai-Bao
    Yan, Jie
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2022, E105D (05) : 1024 - 1038