Intrusion Detection Technique by using K-means, Fuzzy Neural Network and SVM classifiers

被引:0
|
作者
Chandrasekhar, A. M. [1 ]
Raghuveer, K. [2 ]
机构
[1] SJCE, Dept Comp Sci & Engn, Mysore 570006, Karnataka, India
[2] NIE, Dept Informat Sci, Mysore 570008, Karnataka, India
关键词
Intrusion Detection System; Neuro-fuzzy; Radial Support Vector Machine; K-Means Clustering;
D O I
暂无
中图分类号
R-058 [];
学科分类号
摘要
With the impending era of internet, the network security has become the key foundation for lot of financial and business web applications. Intrusion detection is one of the looms to resolve the problem of network security. Imperfectness of intrusion detection systems (IDS) has given an opportunity for data mining to make several important contributions to the field of intrusion detection. In recent years, many researchers are using data mining techniques for building IDS. Here, we propose a new approach by utilizing data mining techniques such as neuro-fuzzy and radial basis support vector machine (SVM) for helping IDS to attain higher detection rate. The proposed technique has four major steps: primarily, k-means clustering is used to generate different training subsets. Then, based on the obtained training subsets, different neuro-fuzzy models are trained. Subsequently, a vector for SVM classification is formed and in the end, classification using radial SVM is performed to detect intrusion has happened or not. To illustrate the applicability and capability of the new approach, the results of experiments on KDD CUP 1999 dataset is demonstrated. Experimental results shows that our proposed new approach do better than BPNN, multiclass SVM and other well-known methods such as decision trees and Columbia model in terms of sensitivity, specificity and in particular detection accuracy.
引用
收藏
页数:7
相关论文
共 50 条
  • [41] An Explainable Evolving Fuzzy Neural Network to Predict the k Barriers for Intrusion Detection Using a Wireless Sensor Network
    Souza, Paulo Vitor de Campos
    Lughofer, Edwin
    Batista, Huoston Rodrigues
    SENSORS, 2022, 22 (14)
  • [42] Robust Intrusion Detection Algorithm Based on K-means and BP
    Zhong, Yangjun
    Zhang, Shuiping
    INTELLIGENT STRUCTURE AND VIBRATION CONTROL, PTS 1 AND 2, 2011, 50-51 : 634 - 638
  • [43] Intrusion Detection System in Ad Hoc Networks with Neural Networks Artificial and K-Means Algorithm
    Canedo, D.
    Romariz, A.
    IEEE LATIN AMERICA TRANSACTIONS, 2019, 17 (07) : 1109 - 1115
  • [44] Hybridization of K-Means and Firefly Algorithm for intrusion detection system
    Kaur A.
    Pal S.K.
    Singh A.P.
    International Journal of System Assurance Engineering and Management, 2018, 9 (04) : 901 - 910
  • [45] Application of kernel spherical k-means for intrusion detection systems
    Rustam, Zuherman
    Nadhifa, Farah
    INTERNATIONAL CONFERENCE ON MATHEMATICS: PURE, APPLIED AND COMPUTATION, 2019, 1218
  • [46] Intrusion Detection Based on Simulated Annealing and K-means Clustering
    Wu Jian
    PROCEEDINGS OF 2010 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND INDUSTRIAL ENGINEERING, VOLS I AND II, 2010, : 1001 - 1005
  • [47] Application of An Improved K-means Clustering Algorithm in Intrusion Detection
    Yu, Dongmei
    Zhang, Guoli
    Chen, Hui
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING, INFORMATION SCIENCE & APPLICATION TECHNOLOGY (ICCIA 2016), 2016, 56 : 277 - 283
  • [48] Application research of improved K-means algorithm in intrusion detection
    Liu Xiaoguo
    Tian Jing
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING, 2015, 17 : 96 - 100
  • [49] Automated Detection of Glaucoma Using Fuzzy K-Means Algorithm and Fuzzy Sugeno Classifier
    Yun, Wong Li
    Koh, Joel E. W.
    JOURNAL OF MEDICAL IMAGING AND HEALTH INFORMATICS, 2013, 3 (04) : 592 - 597
  • [50] The Application on Intrusion Detection Based on K-means Cluster Algorithm
    Meng Jianliang
    Shang Haikun
    Bian Ling
    2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 1, PROCEEDINGS, 2009, : 150 - 152