Effective Discriminant Function for Intrusion Detection Using SVM

被引:0
|
作者
Reddy, R. Ravinder [1 ]
Ramadevi, Y. [2 ]
Sunitha, K. V. N. [3 ]
机构
[1] CBIT, CSED, Hyderabad, Andhra Pradesh, India
[2] CBIT, CSE, Hyderabad, Andhra Pradesh, India
[3] BVRIT W, Hyderabad, Andhra Pradesh, India
来源
2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI) | 2016年
关键词
Discriminant function; support vector machines; intrusion detection; feature selection;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Pinpointing the intrusion from the available huge intrusion data is demanding. Intrusion detection is treated as a data analysis problem. The process of finding accurate intrusion is typical in real world scenarios. For improving accurate identification of intrusions data mining approaches are adopted and proved automatic analysis with improved performance. These techniques enhancing the detection rate of the intrusions which is very effective. Discriminant function is very critical in separating the normal and anomaly behavior accurately. The support vector machine based classification algorithm is used to classify the intrusions accurately by using the discriminant function. The effective discriminant function will be accurately identifies the data into intrusion and anomaly. The evaluation of the discriminant is important in the evaluation of the intrusion detection system. Performance of intrusion detection system depends on the choice of the discriminant function.
引用
收藏
页码:1148 / 1153
页数:6
相关论文
共 50 条
  • [31] RESEARCH ON INTRUSION DETECTION OF SVM BASED ON PSO
    Zhou, Tie-Jun
    Li, Yang
    Li, Jia
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-6, 2009, : 1205 - +
  • [32] The Application of Association Rules to SVM Intrusion Detection
    Shi Lei
    Qu Zhiyi
    Lv Guiqing
    2011 INTERNATIONAL CONFERENCE ON FUTURE SOFTWARE ENGINEERING AND MULTIMEDIA ENGINEERING (FSME 2011), 2011, 7 : 45 - 49
  • [33] Intrusion Detection System Based on SVM for WLAN
    Mohammed, Muamer N.
    Sulaiman, Norrozila
    FIRST WORLD CONFERENCE ON INNOVATION AND COMPUTER SCIENCES (INSODE 2011), 2012, 1 : 313 - 317
  • [34] A Multiclass SVM Classification Approach for Intrusion Detection
    Sahu, Santosh Kumar
    Jena, Sanjay Kumar
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY (ICDCIT 2016), 2016, 9581 : 175 - 181
  • [35] Effective moving shadow detection using statistical discriminant model
    Dai, Jiangyan
    Han, Dianyuan
    Zhao, Xiaowei
    OPTIK, 2015, 126 (24): : 5398 - 5406
  • [36] Learning Automata Based SVM for Intrusion Detection
    Di, Chong
    Su, Yu
    Han, Zhuoran
    Li, Shenghong
    COMMUNICATIONS, SIGNAL PROCESSING, AND SYSTEMS, 2019, 463 : 2067 - 2074
  • [37] SVM-based intrusion detection system
    Qian, Quan
    Geng, Huantong
    Wang, Xufa
    Jisuanji Gongcheng/Computer Engineering, 2006, 32 (09): : 136 - 138
  • [38] Native API based Windows anomaly intrusion detection method using SVM
    Wang, Miao
    Zhang, Cheng
    Yu, Jingjing
    IEEE INTERNATIONAL CONFERENCE ON SENSOR NETWORKS, UBIQUITOUS, AND TRUSTWORTHY COMPUTING, VOL 1, PROCEEDINGS, 2006, : 514 - +
  • [39] Kernel PCA based network intrusion feature extraction and detection using SVM
    Gao, HH
    Yang, HH
    Wang, XY
    ADVANCES IN NATURAL COMPUTATION, PT 2, PROCEEDINGS, 2005, 3611 : 89 - 94
  • [40] Network intrusion Detection for Medical Information System using SVM Optimized by ICSA
    Chen, Xiao
    Song, Wenhui
    WIENER KLINISCHE WOCHENSCHRIFT, 2024, 136 : S463 - S464