Feature selection and design of intrusion detection system based on k-means and triangle area support vector machine

被引:16
|
作者
Tang, Pingjie [1 ]
Jiang, Rang-an [1 ]
Zhao, Mingwei [1 ]
机构
[1] Dalian Univ Technol, Dept Comp Sci & Engn, Dalian, Peoples R China
关键词
intrusion detection system; triangle area feature represention; machine learning; k-means; support vector machine; KDD CUP 1999; ALGORITHM;
D O I
10.1109/ICFN.2010.42
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, challenged by malicious use of network and intentional attacks on personal computer system, intrusion detection system has become an indispensible and infrastructural mechanism for securing critical resource and information. Most current intrusion detection systems focus on hybrid supervised and unsupervised machine learning technologies. The related work has demonstrated that they can get superior performance than applying single machine learning algorithm in detection model. Besides, with the scrutiny of related works, feature selecting and representing techniques are also essential in pursuit of high efficiency and effectiveness. Performance of specified attack type detection should also be improved and evaluated. In this paper, we incorporate information gain (IG) method for selecting more discriminative features and triangle area based support vector machine (TASVM) by combining k-means clustering algorithm and SVM classifier to detect attacks. Our system achieves accuracy of 99.83%, detection rate of 99.88% and false alarm rate of 2.99% on the 10% of KDD CUP 1999 evaluation data set. We also achieve a better detection performance for specific attack types concerning precision and recall.
引用
收藏
页码:144 / 148
页数:5
相关论文
共 50 条
  • [31] Feature selection for intrusion detection with neural networks and support vector machines
    Mukkamala, S
    Sung, AH
    [J]. TRANSPORTATION SECURITY AND INFRASTRUCTURE PROTECTION: SAFETY AND HUMAN PERFORMANCE, 2003, (1822): : 33 - 39
  • [32] Disease Prediction using Hybrid K-means and Support Vector Machine
    Kaur, Sandeep
    Kalra, Sheetal
    [J]. 2016 1ST INDIA INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING (IICIP), 2016,
  • [33] Research of Intrusion Detection Based on Support Vector Machine
    Zhu, Gengming
    Liao, Junguo
    [J]. 2008 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING, 2008, : 434 - 438
  • [34] The research of Intrusion Detection based on Support Vector Machine
    Bo, Li
    Yuan, Chen Yuan
    [J]. PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 21 - 23
  • [35] Comparison Between Support Vector Machine and Fuzzy Kernel C-Means as Classifiers for Intrusion Detection System Using Chi-Square Feature Selection
    Rustam, Z.
    Ariantari, N. P. A. A.
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL SYMPOSIUM ON CURRENT PROGRESS IN MATHEMATICS AND SCIENCES 2017 (ISCPMS2017), 2018, 2023
  • [36] Intrusion detection system for wireless mesh network using multiple support vector machine classifiers with genetic-algorithm-based feature selection
    Vijayanand, R.
    Devaraj, D.
    Kannapiran, B.
    [J]. COMPUTERS & SECURITY, 2018, 77 : 304 - 314
  • [37] Robust Intrusion Detection Algorithm Based on K-means and BP
    Zhong, Yangjun
    Zhang, Shuiping
    [J]. INTELLIGENT STRUCTURE AND VIBRATION CONTROL, PTS 1 AND 2, 2011, 50-51 : 634 - 638
  • [38] Intrusion Detection Based on Simulated Annealing and K-means Clustering
    Wu Jian
    [J]. PROCEEDINGS OF 2010 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND INDUSTRIAL ENGINEERING, VOLS I AND II, 2010, : 1001 - 1005
  • [39] Feature Selection Based Hybrid Anomaly Intrusion Detection System Using K Means and RBF Kernel Function
    Ravale, Ujwala
    Marathe, Nilesh
    Padiya, Puja
    [J]. INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING TECHNOLOGIES AND APPLICATIONS (ICACTA), 2015, 45 : 428 - 435
  • [40] The Application on Intrusion Detection Based on K-means Cluster Algorithm
    Meng Jianliang
    Shang Haikun
    Bian Ling
    [J]. 2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 1, PROCEEDINGS, 2009, : 150 - 152