Design network intrusion detection system using support vector machine

被引:7
|
作者
Ajdani, Mahdi [1 ]
Ghaffary, Hamidreza [1 ]
机构
[1] Islamic Azad Univ, Dept Comp Sci, Ferdows Branch, Ferdows, Iran
关键词
classification; destructive data; intrusion; support vector machine algorithm; DATASET;
D O I
10.1002/dac.4689
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The growing use of the Internet and the existence of vulnerable points in networks have made the usage of intrusion detection systems as one of the most important security elements. This study aimed to present a method to design an analytical framework of detecting destructive data with respect to three factors including time, users' information, and scale. The design can be applied for big data. In the proposed method, to train data, the time has been divided into subperiods exploiting users' review information during each period of time, and the data have been trained. Also, storing methods have been applied for scalability to enhance the speed and reduce the volume of computations. The method used in this study is a combination of hardware-software method to detect destructive data to cluster them (VIRUS TOTAL Dataset). Also, the proposed method applied a new algorithm of modified vector machine, and the efficiency of the algorithm has promoted support vector machine (SVM), designed to operate better than previous methods. The results showed that the proposed method is more acceptable than other previous methods. The results indicated that the method works with the accuracy of 0.97 which can be fairly accepted.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Network Intrusion Detection System using Genetic Network Programming with Support Vector Machine
    Sujatha, Kola P.
    Priya, Suba C.
    Kannan, A.
    [J]. PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI'12), 2012, : 645 - 649
  • [2] Using Rough Set and Support Vector Machine for Network Intrusion Detection System
    Chen, Rung-Ching
    Cheng, Kai-Fan
    Chen, Ying-Hao
    Hsieh, Chia-Fen
    [J]. 2009 FIRST ASIAN CONFERENCE ON INTELLIGENT INFORMATION AND DATABASE SYSTEMS, 2009, : 465 - 470
  • [3] Network intrusion detection algorithm using modified support vector machine
    [J]. Hong, D. (dear_red9@163.com), 2012, Advanced Institute of Convergence Information Technology, Myoungbo Bldg 3F,, Bumin-dong 1-ga, Seo-gu, Busan, 602-816, Korea, Republic of (04):
  • [4] Enhanced Intrusion Detection System Based on AutoEncoder Network and Support Vector Machine
    Dadi, Sihem
    Abid, Mohamed
    [J]. NETWORKING, INTELLIGENT SYSTEMS AND SECURITY, 2022, 237 : 327 - 341
  • [5] Intrusion Detection Using Isomap and Support Vector Machine
    Zheng, Kai-mei
    Qian, Xu
    Zhou, Yu
    Jia, Li-juan
    [J]. 2009 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND COMPUTATIONAL INTELLIGENCE, VOL III, PROCEEDINGS, 2009, : 235 - 239
  • [6] A Hierarchical Intrusion Detection System using Support Vector Machine for SDN Network in Cloud Data Center
    Schueller, Quentin
    Basu, Kashinath
    Younas, Muhammad
    Patel, Mohit
    Ball, Frank
    [J]. 2018 28TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2018, : 380 - 385
  • [7] Anomaly-Based Intrusion Detection System Using Support Vector Machine
    Krishnaveni, S.
    Vigneshwar, Palani
    Kishore, S.
    Jothi, B.
    Sivamohan, S.
    [J]. ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY COMPUTATIONS IN ENGINEERING SYSTEMS, 2020, 1056 : 723 - 731
  • [8] Performance Comparison of Intrusion Detection System based Anomaly Detection using Artificial Neural Network and Support Vector Machine
    Cahyo, Aditya Nur
    Hidayat, Risanuri
    Adhipta, Dani
    [J]. ADVANCES OF SCIENCE AND TECHNOLOGY FOR SOCIETY, 2016, 1755
  • [9] Network Intrusion Detection Using Support Vector Machine Based on Particle Swarm Optimization
    Wang, Li
    Dong, Chunhua
    Hu, Jianping
    Li, Guodong
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON APPLIED SCIENCE AND ENGINEERING INNOVATION, 2015, 12 : 665 - 670
  • [10] Implementing a Network Intrusion Detection System Using Semi-supervised Support Vector Machine and Random Forest
    Shah, Sandeep
    Muhuri, Pramita Sree
    Yuan, Xiaohong
    Roy, Kaushik
    Chatterjee, Prosenjit
    [J]. ACMSE 2021: PROCEEDINGS OF THE 2021 ACM SOUTHEAST CONFERENCE, 2021, : 180 - 184