An effective intrusion detection framework based on SVM with feature augmentation

被引:162
|
作者
Wang, Huiwen [1 ,2 ]
Gu, Jie [1 ]
Wang, Shanshan [1 ]
机构
[1] Beihang Univ, Sch Econ & Management, Beijing 100191, Peoples R China
[2] Beijing Key Lab Emergence Support Simulat Technol, Beijing 100191, Peoples R China
基金
国家高技术研究发展计划(863计划);
关键词
Intrusion detection; Marginal density ratios transformation; Network security; Support vector machine; FEATURE-SELECTION APPROACH; SUPPORT VECTOR MACHINES; DETECTION SYSTEM; ANOMALY DETECTION; OPTIMIZATION; CLASSIFIER; ALGORITHM; MODEL;
D O I
10.1016/j.knosys.2017.09.014
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Network security is becoming increasingly important in our daily lives not only for organizations but also for individuals. Intrusion detection systems have been widely used to prevent information from being compromised, and various machine-learning techniques have been proposed to enhance the performance of intrusion detection systems. However, higher-quality training data is an essential determinant that could improve detection performance. It is well known that the marginal density ratio is the most powerful univariate classifier. In this paper, we propose an effective intrusion detection framework based on a support vector machine (SVM) with augmented features. More specifically, we implement the logarithm marginal density ratios transformation to form the original features with the goal of obtaining new and better-quality transformed features that can greatly improve the detection capability of an SVM-based detection model. The NSL-KDD dataset is used to evaluate the proposed method, and the empirical results show that it achieves a better and more robust performance than existing methods in terms of accuracy, detection rate, false alarm rate and training speed. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:130 / 139
页数:10
相关论文
共 50 条
  • [21] Cloud Intrusion Detection System Based on SVM
    Alheeti K.M.A.
    Lateef A.A.A.
    Alzahrani A.
    Imran A.
    Al Dosary D.
    International Journal of Interactive Mobile Technologies, 2023, 17 (11) : 101 - 114
  • [22] Method of Intrusion Detection System Based on SVM
    Jia, Yanru
    Peng, Jian
    PROGRESS IN INTELLIGENCE COMPUTATION AND APPLICATIONS, 2008, : 341 - 344
  • [23] An intrusion detection method based on SVM and KPCA
    Li, Yuan-Cheng
    Wang, Zhong-Qiang
    2007 INTERNATIONAL CONFERENCE ON WAVELET ANALYSIS AND PATTERN RECOGNITION, VOLS 1-4, PROCEEDINGS, 2007, : 1462 - 1466
  • [24] RESEARCH ON INTRUSION DETECTION OF SVM BASED ON PSO
    Zhou, Tie-Jun
    Li, Yang
    Li, Jia
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-6, 2009, : 1205 - +
  • [25] Intrusion Detection System Based on SVM for WLAN
    Mohammed, Muamer N.
    Sulaiman, Norrozila
    FIRST WORLD CONFERENCE ON INNOVATION AND COMPUTER SCIENCES (INSODE 2011), 2012, 1 : 313 - 317
  • [26] Learning Automata Based SVM for Intrusion Detection
    Di, Chong
    Su, Yu
    Han, Zhuoran
    Li, Shenghong
    COMMUNICATIONS, SIGNAL PROCESSING, AND SYSTEMS, 2019, 463 : 2067 - 2074
  • [27] SVM-based intrusion detection system
    Qian, Quan
    Geng, Huantong
    Wang, Xufa
    Jisuanji Gongcheng/Computer Engineering, 2006, 32 (09): : 136 - 138
  • [28] An Effective RF-based Intrusion Detection Algorithm with Feature Reduction and Transformation
    Wei, Jinxia
    Long, Chun
    Wan, Wei
    Zhang, Yurou
    Zhao, Jing
    Du, Guanyao
    PROCEEDINGS OF THE 21ST INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS (ICEIS 2019), VOL 2, 2019, : 221 - 228
  • [29] An effective text plagiarism detection system based on feature selection and SVM techniques
    El-Rashidy, Mohamed A. A.
    Mohamed, Ramy G. G.
    El-Fishawy, Nawal A. A.
    Shouman, Marwa A. A.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (1) : 2609 - 2646
  • [30] An effective text plagiarism detection system based on feature selection and SVM techniques
    Mohamed A. El-Rashidy
    Ramy G. Mohamed
    Nawal A. El-Fishawy
    Marwa A. Shouman
    Multimedia Tools and Applications, 2024, 83 : 2609 - 2646