An effective intrusion detection framework based on SVM with feature augmentation

被引:162
|
作者
Wang, Huiwen [1 ,2 ]
Gu, Jie [1 ]
Wang, Shanshan [1 ]
机构
[1] Beihang Univ, Sch Econ & Management, Beijing 100191, Peoples R China
[2] Beijing Key Lab Emergence Support Simulat Technol, Beijing 100191, Peoples R China
基金
国家高技术研究发展计划(863计划);
关键词
Intrusion detection; Marginal density ratios transformation; Network security; Support vector machine; FEATURE-SELECTION APPROACH; SUPPORT VECTOR MACHINES; DETECTION SYSTEM; ANOMALY DETECTION; OPTIMIZATION; CLASSIFIER; ALGORITHM; MODEL;
D O I
10.1016/j.knosys.2017.09.014
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Network security is becoming increasingly important in our daily lives not only for organizations but also for individuals. Intrusion detection systems have been widely used to prevent information from being compromised, and various machine-learning techniques have been proposed to enhance the performance of intrusion detection systems. However, higher-quality training data is an essential determinant that could improve detection performance. It is well known that the marginal density ratio is the most powerful univariate classifier. In this paper, we propose an effective intrusion detection framework based on a support vector machine (SVM) with augmented features. More specifically, we implement the logarithm marginal density ratios transformation to form the original features with the goal of obtaining new and better-quality transformed features that can greatly improve the detection capability of an SVM-based detection model. The NSL-KDD dataset is used to evaluate the proposed method, and the empirical results show that it achieves a better and more robust performance than existing methods in terms of accuracy, detection rate, false alarm rate and training speed. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:130 / 139
页数:10
相关论文
共 50 条
  • [1] A novel approach to intrusion detection using SVM ensemble with feature augmentation
    Gu, Jie
    Wang, Lihong
    Wang, Huiwen
    Wang, Shanshan
    COMPUTERS & SECURITY, 2019, 86 : 53 - 62
  • [2] An Incremental SVM for Intrusion Detection Based on Key Feature Selection
    Xia, Yong-Xiang
    Shi, Zhi-Cai
    Hu, Zhi-Hua
    2009 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL 3, PROCEEDINGS, 2009, : 205 - +
  • [3] An effective intrusion detection approach using SVM with naive Bayes feature embedding
    Gu, Jie
    Lu, Shan
    COMPUTERS & SECURITY, 2021, 103
  • [4] Prior knowledge SVM-based intrusion detection framework
    Zhang, Gang
    Yin, Jian
    Liang, Zhaohui
    Cai, YanGuang
    ICNC 2007: THIRD INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, VOL 2, PROCEEDINGS, 2007, : 489 - +
  • [5] Selection and detection of network intrusion feature based on BPSO-SVM
    College of Information Science and Engineering, East China University of Science and Technology, Shanghai 200237, China
    不详
    Jisuanji Gongcheng, 2006, 8 (37-39):
  • [6] SVM Based Intrusion Detection Method with Nonlinear Scaling and Feature Selection
    Zhang, Fei
    Zhen, Peining
    Jing, Dishan
    Tang, Xiaotang
    Chen, Hai-Bao
    Yan, Jie
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2022, E105D (05) : 1024 - 1038
  • [7] FS-SVM based intrusion detection feature selection and classification
    Zhang, Xueqin
    Gu, Chunhua
    DCABES 2006 PROCEEDINGS, VOLS 1 AND 2, 2006, : 1084 - 1086
  • [8] An Intelligent CRF Based Feature Selection for Effective Intrusion Detection
    Ganapathy, Sannasi
    Vijayakumar, Pandi
    Yogesh, Palanichamy
    Kannan, Arputharaj
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2016, 13 (01) : 44 - 50
  • [9] Feature Selection for Effective Anomaly-Based Intrusion Detection
    Ghali, Noreen I.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (03): : 285 - 289
  • [10] Two-level feature selection method based on SVM for intrusion detection
    Wu, Xiao-Nian
    Peng, Xiao-Jin
    Yang, Yu-Yang
    Fang, Kun
    Tongxin Xuebao/Journal on Communications, 2015, 36 (04):