Efficient Classification of Portscan Attacks using Support Vector Machine

被引:0
|
作者
Vidhya, M. [1 ]
机构
[1] Sri Venkateswara Coll Engn, Dept Comp Sci & Engn, Madras, Tamil Nadu, India
关键词
WEKA; LIBSVM; RBF; SVM;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Support Vector Machine, a powerful data mining technique is used for the classification of attacks. SVM is implemented using WEKA tool in which the Radial Basis Function proves to be an efficient Kernel for the classification of portscan attacks. KDD'99 dataset consisting of portscan and normal traces termed as mixed traffic is given as input to SVM in two phases, i.e., without feature reduction and with feature reduction using Consistency Subset Evaluation algorithm and Best First search method. In the first phase, the mixed traffic as a whole is given as input to SVM. In the second phase, feature reduction algorithm is applied over the mixed traffic and then fed to SVM. Finally the performance is compared in accordance with classification between the two phases. The performance of the proposed method is measured using false positive rate and computation time.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] Pattern classification using support vector machine ensemble
    Kim, HC
    Pang, SN
    Je, HM
    Kim, DJ
    Bang, SY
    [J]. 16TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, VOL II, PROCEEDINGS, 2002, : 160 - 163
  • [32] Using a novel support vector machines for efficient classification
    Yong Wang
    Wei Zhang
    Jun Chen
    Li Xiao
    Jianfu Li
    [J]. ICMIT 2007: MECHATRONICS, MEMS, AND SMART MATERIALS, PTS 1 AND 2, 2008, 6794
  • [33] Distributed Denial of Service Attacks Detection Using Support Vector Machine
    Ahmad, Iftikhar
    Abdullah, Azween B.
    Alghamdi, Abdullah S.
    Hussain, Muhammad
    [J]. INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2011, 14 (01): : 127 - 134
  • [34] BRAIN TUMOR CLASSIFICATION USING EFFICIENT DEEP FEATURES OF MRI SCANS AND SUPPORT VECTOR MACHINE
    Khan, Ahmad Neyaz
    Nazarian, Habibeh
    Golilarz, Noorbakhsh Amiri
    Addeh, Abdoljalil
    Li, Jian Ping
    Khan, Ghufran Ahmad
    [J]. 2020 17TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2020, : 314 - 318
  • [35] Layered Architecture to Detect Attacks Using Asymmetric Support Vector Machine
    Edith, J. Jensi
    Chandrasekar, A.
    [J]. JOURNAL OF APPLIED SECURITY RESEARCH, 2014, 9 (02) : 133 - 149
  • [36] Detection of Malicious Network Traffic Attacks Using Support Vector Machine
    Dwivedi, Devanshi
    Bhushan, Aditya
    Singh, Ashutosh Kumar
    Snehlata
    [J]. ADVANCED NETWORK TECHNOLOGIES AND INTELLIGENT COMPUTING, ANTIC 2023, PT II, 2024, 2091 : 54 - 68
  • [37] Efficient random subspace support vector machine for hyperspectral image classification
    Huang, Hisao-Yun
    Shao, Yuehjen E.
    Cheng, Yung-Wen
    Lu, Hung-Yi
    Yang, Nanping
    [J]. ICIC Express Letters, 2012, 6 (02): : 443 - 448
  • [38] Land cover classification by support vector machine: Towards efficient training
    Mathur, A
    Foody, GM
    [J]. IGARSS 2004: IEEE INTERNATIONAL GEOSCIENCE AND REMOTE SENSING SYMPOSIUM PROCEEDINGS, VOLS 1-7: SCIENCE FOR SOCIETY: EXPLORING AND MANAGING A CHANGING PLANET, 2004, : 742 - 744
  • [39] Support Vector Machine for Classification of Terrorist Attacks Based on Intelligent Tuned Harmony Search
    Bu, Bing
    Pi, Zhenyang
    Wang, Lei
    [J]. EKOLOJI, 2019, 28 (107): : 153 - 164
  • [40] Document classification based on support vector machine using a concept vector model
    Deng, Shuang
    Peng, Hong
    [J]. 2006 IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE, (WI 2006 MAIN CONFERENCE PROCEEDINGS), 2006, : 473 - +