Effective Discriminant Function for Intrusion Detection Using SVM

被引:0
|
作者
Reddy, R. Ravinder [1 ]
Ramadevi, Y. [2 ]
Sunitha, K. V. N. [3 ]
机构
[1] CBIT, CSED, Hyderabad, Andhra Pradesh, India
[2] CBIT, CSE, Hyderabad, Andhra Pradesh, India
[3] BVRIT W, Hyderabad, Andhra Pradesh, India
来源
2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI) | 2016年
关键词
Discriminant function; support vector machines; intrusion detection; feature selection;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Pinpointing the intrusion from the available huge intrusion data is demanding. Intrusion detection is treated as a data analysis problem. The process of finding accurate intrusion is typical in real world scenarios. For improving accurate identification of intrusions data mining approaches are adopted and proved automatic analysis with improved performance. These techniques enhancing the detection rate of the intrusions which is very effective. Discriminant function is very critical in separating the normal and anomaly behavior accurately. The support vector machine based classification algorithm is used to classify the intrusions accurately by using the discriminant function. The effective discriminant function will be accurately identifies the data into intrusion and anomaly. The evaluation of the discriminant is important in the evaluation of the intrusion detection system. Performance of intrusion detection system depends on the choice of the discriminant function.
引用
收藏
页码:1148 / 1153
页数:6
相关论文
共 50 条
  • [21] Improving accuracy of intrusion detection model using PCA and optimized SVM
    Ikram S.T.
    Cherukuri A.K.
    Journal of Computing and Information Technology, 2016, 24 (02) : 133 - 148
  • [22] A novel approach to intrusion detection using SVM ensemble with feature augmentation
    Gu, Jie
    Wang, Lihong
    Wang, Huiwen
    Wang, Shanshan
    COMPUTERS & SECURITY, 2019, 86 : 53 - 62
  • [23] Ship Intrusion Detection Security System Using Image Processing & SVM
    Dugad, Shashikant
    Puliyadi, Vijayalakshmi
    Palod, Heet
    Johnson, Nidhi
    Rajput, Simran
    Johnny, Swapna
    2017 INTERNATIONAL CONFERENCE ON NASCENT TECHNOLOGIES IN ENGINEERING (ICNTE-2017), 2017,
  • [24] Optimal feature selection in intrusion detection using SVM-CA
    Sugi, S. Shinly Swarna
    Ratna, S. Raja
    International Journal of Networking and Virtual Organisations, 2021, 25 (02) : 103 - 113
  • [25] EFFECTIVE INTRUSION DETECTION METHOD FOR MANETs USING EAACK
    Sherine, Elizabeth M.
    2015 INTERNATIONAL CONFERENCED ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2015), 2015,
  • [26] Intrusion Detection by Pipelined Approach Using Conditional Random Fields and Optimization Using SVM
    Jayaprakash, R.
    Uma, V.
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 2, 2011, 191 : 656 - 665
  • [27] AN INTRUSION DETECTION METHOD BASED ON KICA AND SVM
    Li, Yuancheng
    Wang, Zhongqiang
    Ma, Yinglong
    2008 7TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-23, 2008, : 2141 - 2144
  • [28] Cloud Intrusion Detection System Based on SVM
    Alheeti K.M.A.
    Lateef A.A.A.
    Alzahrani A.
    Imran A.
    Al Dosary D.
    International Journal of Interactive Mobile Technologies, 2023, 17 (11) : 101 - 114
  • [29] Method of Intrusion Detection System Based on SVM
    Jia, Yanru
    Peng, Jian
    PROGRESS IN INTELLIGENCE COMPUTATION AND APPLICATIONS, 2008, : 341 - 344
  • [30] An intrusion detection method based on SVM and KPCA
    Li, Yuan-Cheng
    Wang, Zhong-Qiang
    2007 INTERNATIONAL CONFERENCE ON WAVELET ANALYSIS AND PATTERN RECOGNITION, VOLS 1-4, PROCEEDINGS, 2007, : 1462 - 1466