Novel Approach of Intrusion Detection Classification Deeplearning Using SVM

被引:6
|
作者
Nagar, Pritesh [1 ]
Menaria, Hemant Kumar [1 ]
Tiwari, Manish [1 ]
机构
[1] Geetanjali Inst Tech Studies, Udaipur, Rajasthan, India
关键词
Intrusion detection system; Denial of service; Artificial neural network;
D O I
10.1007/978-981-15-0029-9_29
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The main objective of intrusion detection systems (IDS) is to discover the dynamic and the virulent form of network traffic that simply changes according to the characteristics of the network. The IDS methodology represents a prominent developing area in the field of computer network technology and its security. Different form of IDS has been developed working on distinctive approaches. One such kind of approach where it is used is the machine learning mechanism. In the proposed methodology, an experiment is applied on the data set named as KDD-99, including its subclasses such as denial of service (DOS), other types of attacks and the class without any form of attack. Depending upon the machine learning algorithms various distinct forms of IDS have been developed which further checks the optimization-based potential features in connectionwith the neural network classifier for the various forms of IDS-based attacks. This approach provides a comparative study between theANNand the optimizer-basedANNtechnology. The experimental analysis shows the convolution neural network with SVM show effective analysis providing accurate forms of IDS, thereby improving its detection based on individual class along with maintaining its results fundamentally.
引用
收藏
页码:365 / 381
页数:17
相关论文
共 50 条
  • [1] A Multiclass SVM Classification Approach for Intrusion Detection
    Sahu, Santosh Kumar
    Jena, Sanjay Kumar
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY (ICDCIT 2016), 2016, 9581 : 175 - 181
  • [2] A novel approach to intrusion detection using SVM ensemble with feature augmentation
    Gu, Jie
    Wang, Lihong
    Wang, Huiwen
    Wang, Shanshan
    COMPUTERS & SECURITY, 2019, 86 : 53 - 62
  • [3] A novel approach to intrusion detection based on SVD and SVM
    Tao, Xin Min
    Liu, Fu Rong
    Zhou, Ting Xian
    IECON 2004: 30TH ANNUAL CONFERENCE OF IEEE INDUSTRIAL ELECTRONICS SOCIETY, VOL 3, 2004, : 2028 - 2033
  • [4] Detection and classification of anomaly intrusion using hierarchy clustering and SVM
    Tang, Chenghua
    Xiang, Yang
    Wang, Yu
    Qian, Junyan
    Qiang, Baohua
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3401 - 3411
  • [5] A Novel Approach to Intrusion Detection Base on Fast Incremental SVM
    Mu, Qi
    Zhang, Yongjun
    Niu, Qian
    PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012), 2012, : 1467 - 1470
  • [6] Intrusion Detection Using SVM
    Liu Wu
    Ren Ping
    Liu Ke
    Duan Hai-xin
    2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [7] An intrusion detection approach using SVM and multiple kernel method
    Li, Yuping
    Li, Weidong
    Wu, Guoqiang
    International Journal of Advancements in Computing Technology, 2012, 4 (01) : 463 - 469
  • [8] Novel Approach Using Deep Learning for Intrusion Detection and Classification of the Network Traffic
    Ahmad, Shahbaz
    Arif, Fahim
    Zabeehullah
    Iltaf, Naima
    2020 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND VIRTUAL ENVIRONMENTS FOR MEASUREMENT SYSTEMS AND APPLICATIONS (CIVEMSA 2020), 2020,
  • [9] A novel feature selection approach for intrusion detection data classification
    Ambusaidi, Mohammed A.
    He, Xiangjian
    Tan, Zhiyuan
    Nanda, Priyadarsi
    Lu, Liang Fu
    Nagar, Upasana T.
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 82 - 89
  • [10] Intrusion Detection by Pipelined Approach Using Conditional Random Fields and Optimization Using SVM
    Jayaprakash, R.
    Uma, V.
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 2, 2011, 191 : 656 - 665