A comparative study of techniques for intrusion detection

被引:30
|
作者
Mukkamala, S [1 ]
Sung, AH [1 ]
机构
[1] New Mexico Inst Min & Technol, Dept Comp Sci, Socorro, NM USA
关键词
intrusion detection; AI techniques; information security;
D O I
10.1109/TAI.2003.1250243
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Due to increasing incidents of cyber attacks and heightened concerns for cyber terrorism, implementing effective intrusion detection systems (IDSs) is an essential task for protecting cyber security--as well as physical security because of the great dependence on networked computers for the operational control of various infrastructures. Building effective IDSs, unfortunately, has remained an elusive goal owing to the great technical challenges involved; and applied AI techniques are increasingly being utilized in attempts to overcome the difficulties. This paper presents a comparative study of using support vector machines (SVMs), artificial neural networks (ANNs), multivariate adaptive regression splines (MARS) and linear genetic programs (LGPs) for intrusion detection. We investigate and compare the performance of IDSs based on the mentioned techniques, with respect to a well-known set of intrusion evaluation data gathered by Lincoln Labs. Through a variety of experiments and analysis, it is found that, with appropriately chosen population size, program size, crossover rate and mutation rate, LGPs outperform other techniques in terms of detection accuracy at the expense of time. SVMs outperform MARS and ANNs in three critical aspects of intrusion detection: accuracy, training time, and testing time.
引用
收藏
页码:570 / 577
页数:8
相关论文
共 50 条
  • [21] A comparative study of classification algorithms for network intrusion detection
    Khoshgoftaar, TM
    Gao, KH
    Wang, YL
    TENTH ISSAT INTERNATIONAL CONFERENCE ON RELIABILITY AND QUALITY IN DESIGN, PROCEEDINGS, 2004, : 168 - 172
  • [22] Survey of intrusion detection techniques
    Lunt, Teresa F.
    Computers and Security, 1993, 12 (04): : 405 - 418
  • [23] Intrusion detection techniques and approaches
    Verwoerd, T
    Hunt, R
    COMPUTER COMMUNICATIONS, 2002, 25 (15) : 1356 - 1365
  • [24] A comparative performance evaluation of intrusion detection techniques for hierarchical wireless sensor networks
    Soliman, H. H.
    Hikal, Noha A.
    Sakr, Nehal A.
    EGYPTIAN INFORMATICS JOURNAL, 2012, 13 (03) : 225 - 238
  • [25] A Comparative Study of Landmine Detection Techniques
    Kasban, H.
    Zahran, O.
    Elaraby, Sayed M.
    El-Kordy, M.
    El-Samie, F. E. Abd
    SENSING AND IMAGING, 2010, 11 (03): : 89 - 112
  • [26] Comparative Evaluation of Intrusion with Different Techniques
    Erkan, Mustafa
    Mandiraci, Sedat
    Yigit, Mehmet Demir
    TURKISH JOURNAL OF ORTHODONTICS, 2006, 19 (02) : 159 - 169
  • [27] Adaptation techniques for intrusion detection and intrusion response systems
    Ragsdale, DJ
    Carver, CA
    Humphries, JW
    Pooch, UW
    SMC 2000 CONFERENCE PROCEEDINGS: 2000 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN & CYBERNETICS, VOL 1-5, 2000, : 2344 - 2349
  • [28] A Collaborative Study of Intrusion Detection and Prevention Techniques in Cloud Computing
    Alam, Shadab
    Shuaib, Mohammed
    Samad, Abdus
    INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATIONS, VOL 1, 2019, 55 : 231 - 240
  • [29] A Brief Study Of Intrusion Detection Techniques To Overcome Cyber Attacks
    Sharma, Pradeep Kumar
    Gupta, Aman Kumar
    Chakraborty, Debraj
    Mondal, Pritam Kumar
    Banerjee, Santu
    Chakraborty, Kumardeep
    Dey, Drik
    Chakraborty, Rounak
    Das, Debangshu
    Ghoshal, Tuhin
    Sinha, Anirban
    Mondal, Souvik
    Pal, Soumyadeep
    Sharma, Rahul
    Gorai, Shreyash
    Roy, Suvankar
    Das, Bhaswat Jyoti
    Dey, Aniket
    Sarker, Siddhartha
    Saha, Sourav
    Poddar, Rohan
    Saha, Nabanit
    Dubey, Saurav
    Singh, Rohan
    Das, Surajit
    Hazra, Debanik
    Das, Saikat
    2017 8TH ANNUAL INDUSTRIAL AUTOMATION AND ELECTROMECHANICAL ENGINEERING CONFERENCE (IEMECON), 2017, : 354 - 358
  • [30] Intrusion Detection using Data Mining: A contemporary comparative study
    Bouteraa, Imad
    Derdour, Makhlouf
    Ahmim, Ahmed
    2018 3RD INTERNATIONAL CONFERENCE ON PATTERN ANALYSIS AND INTELLIGENT SYSTEMS (PAIS), 2018, : 316 - 323