Intrusion Detection using An Ensemble of Support Vector Machines

被引:5
|
作者
Kumar, G. Kishor [1 ]
Kumar, R. Raja [1 ]
Basha, M. Suleman [1 ]
Reddy, K. Nageswara [1 ]
机构
[1] RGMCET, Dept CSE, Nandyal, India
关键词
Bootstrapping; classification; svm; ensemble techniques; intrusion detection;
D O I
10.26782/jmcms.spl.3/2019.09.00020
中图分类号
O3 [力学];
学科分类号
08 ; 0801 ;
摘要
This paper "an ensemble of Support Vector Machines (SVM)" for network-based intrusion detection. Bootstrapping is applied to derive various training sets from the given training set. Then a SVM is derived for each training set. The decisions of all SVMS is taken and majority voting is considered to classify the given query pattern as a normal or an anomalous one. We have shown the results of applying an ensemble of Support Vector Machines to the two standard data sets ,viz., 1999 KDDCupandCreditcarddatasets.
引用
收藏
页码:266 / 275
页数:10
相关论文
共 50 条
  • [1] Intrusion detection using neural networks and support vector machines
    Mukkamala, S
    Janoski, G
    Sung, A
    PROCEEDING OF THE 2002 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, VOLS 1-3, 2002, : 1702 - 1707
  • [2] Intrusion Detection Using Principal Component Analysis and Support Vector Machines
    Mishra, Anukriti
    Cheng, Albert M. K.
    Zhang, Yunpeng
    2020 IEEE 16TH INTERNATIONAL CONFERENCE ON CONTROL & AUTOMATION (ICCA), 2020, : 907 - 912
  • [3] Intrusion Detection For Controller Area Network Using Support Vector Machines
    Tanksale, Vinayak
    2019 IEEE 16TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS WORKSHOPS (MASSW 2019), 2019, : 121 - 126
  • [4] Application of Improved Support Vector Machines in Intrusion Detection
    Zhang, Yongli
    Zhu, Yanwei
    2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 56 - 59
  • [5] Intrusion detection Based on Fuzzy support vector machines
    Du Hongle
    Teng Shaohua
    Zhu Qingfang
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 639 - +
  • [6] Intrusion detection with support vector machines and generative models
    Baras, JS
    Rabi, M
    INFORMATION SECURITY, PROCEEDINGS, 2002, 2433 : 32 - 47
  • [7] Intrusion Detection Model with Twin Support Vector Machines
    何俊
    郑世慧
    Journal of Shanghai Jiaotong University(Science), 2014, 19 (04) : 448 - 454
  • [8] Improving Intrusion Detection with Adaptive Support Vector Machines
    Macek, N.
    Dordevic, B.
    Timcenko, V.
    Bojovic, M.
    Milosavljevic, M.
    ELEKTRONIKA IR ELEKTROTECHNIKA, 2014, 20 (07) : 57 - 60
  • [9] Intrusion detection model with twin support vector machines
    He J.
    Zheng S.-H.
    Journal of Shanghai Jiaotong University (Science), 2014, 19 (04) : 448 - 454
  • [10] A new intrusion detection system using support vector machines and hierarchical clustering
    Khan, Latifur
    Awad, Mamoun
    Thuraisingham, Bhavani
    VLDB JOURNAL, 2007, 16 (04): : 507 - 521