A comparative study of techniques for intrusion detection

被引:30
|
作者
Mukkamala, S [1 ]
Sung, AH [1 ]
机构
[1] New Mexico Inst Min & Technol, Dept Comp Sci, Socorro, NM USA
关键词
intrusion detection; AI techniques; information security;
D O I
10.1109/TAI.2003.1250243
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Due to increasing incidents of cyber attacks and heightened concerns for cyber terrorism, implementing effective intrusion detection systems (IDSs) is an essential task for protecting cyber security--as well as physical security because of the great dependence on networked computers for the operational control of various infrastructures. Building effective IDSs, unfortunately, has remained an elusive goal owing to the great technical challenges involved; and applied AI techniques are increasingly being utilized in attempts to overcome the difficulties. This paper presents a comparative study of using support vector machines (SVMs), artificial neural networks (ANNs), multivariate adaptive regression splines (MARS) and linear genetic programs (LGPs) for intrusion detection. We investigate and compare the performance of IDSs based on the mentioned techniques, with respect to a well-known set of intrusion evaluation data gathered by Lincoln Labs. Through a variety of experiments and analysis, it is found that, with appropriately chosen population size, program size, crossover rate and mutation rate, LGPs outperform other techniques in terms of detection accuracy at the expense of time. SVMs outperform MARS and ANNs in three critical aspects of intrusion detection: accuracy, training time, and testing time.
引用
收藏
页码:570 / 577
页数:8
相关论文
共 50 条
  • [1] A Comparative Study of Classification Techniques for Intrusion Detection
    Chauhan, Himadri
    Kumar, Vipin
    Pundir, Sumit
    Pilli, Emmanuel S.
    [J]. 2013 INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL AND BUSINESS INTELLIGENCE (ISCBI), 2013, : 40 - 43
  • [2] Intrusion detection using classification techniques: a comparative study
    Bouteraa, Imad
    Derdour, Makhlouf
    Ahmim, Ahmed
    [J]. INTERNATIONAL JOURNAL OF DATA MINING MODELLING AND MANAGEMENT, 2020, 12 (01) : 65 - 86
  • [3] A Comparative Study of Feature Selection Techniques for Intrusion Detection
    Kaur, Rajveer
    Kumar, Gulshan
    Kumar, Krishan
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 2120 - 2124
  • [4] Intrusion techniques: Comparative study of network instrusion detection systems
    Garuba, Moses
    Liu, Chunmei
    Fraites, Duane
    [J]. PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 592 - 598
  • [5] Comparative study of supervised machine learning techniques for intrusion detection
    Gharibian, Farnaz
    Ghorbani, Ali A.
    [J]. CNSR 2007: PROCEEDINGS OF THE FIFTH ANNUAL CONFERENCE ON COMMUNICATION NETWORKS AND SERVICES RESEARCH, 2007, : 350 - +
  • [6] A comparative Study between Ensemble Learning Techniques in Intrusion Detection Context
    Jemili, Farah
    Meddeb, Rahma
    Kamel, Yasmine
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2023, 18 (01): : 1 - 12
  • [7] Comparative Study between Big Data Analysis Techniques in Intrusion Detection
    Hafsa, Mounir
    Jemili, Farah
    [J]. BIG DATA AND COGNITIVE COMPUTING, 2019, 3 (01) : 1 - 13
  • [8] A comparative study of unsupervised machine learning and data mining techniques for intrusion detection
    Sadoddin, Reza
    Ghorbani, Ali A.
    [J]. MACHINE LEARNING AND DATA MINING IN PATTERN RECOGNITION, PROCEEDINGS, 2007, 4571 : 404 - +
  • [9] A Comparative Study of AI-Based Intrusion Detection Techniques in Critical Infrastructures
    Otoum, Safa
    Kantarci, Burak
    Mouftah, Hussein
    [J]. ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2021, 21 (04)
  • [10] Machine Learning Techniques for Intrusion Detection: A Comparative Analysis
    Hamid, Yasir
    Sugumaran, M.
    Journaux, Ludovic
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATICS AND ANALYTICS (ICIA' 16), 2016,