A new intrusion detection system using support vector machines and hierarchical clustering

被引:0
|
作者
Latifur Khan
Mamoun Awad
Bhavani Thuraisingham
机构
[1] University of Texas at Dallas,
来源
The VLDB Journal | 2007年 / 16卷
关键词
Support Vector Machine; Support Vector; Training Time; Anomaly Detection; Reference Vector;
D O I
暂无
中图分类号
学科分类号
摘要
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network services by purposely occupying or sabotaging network resources and services. This can be done by sending large amounts of network traffic, exploiting well-known faults in networking services, and by overloading network hosts. Intrusion Detection attempts to detect computer attacks by examining various data records observed in processes on the network and it is split into two groups, anomaly detection systems and misuse detection systems. Anomaly detection is an attempt to search for malicious behavior that deviates from established normal patterns. Misuse detection is used to identify intrusions that match known attack scenarios. Our interest here is in anomaly detection and our proposed method is a scalable solution for detecting network-based anomalies. We use Support Vector Machines (SVM) for classification. The SVM is one of the most successful classification algorithms in the data mining area, but its long training time limits its use. This paper presents a study for enhancing the training time of SVM, specifically when dealing with large data sets, using hierarchical clustering analysis. We use the Dynamically Growing Self-Organizing Tree (DGSOT) algorithm for clustering because it has proved to overcome the drawbacks of traditional hierarchical clustering algorithms (e.g., hierarchical agglomerative clustering). Clustering analysis helps find the boundary points, which are the most qualified data points to train SVM, between two classes. We present a new approach of combination of SVM and DGSOT, which starts with an initial training set and expands it gradually using the clustering structure produced by the DGSOT algorithm. We compare our approach with the Rocchio Bundling technique and random selection in terms of accuracy loss and training time gain using a single benchmark real data set. We show that our proposed variations contribute significantly in improving the training process of SVM with high generalization accuracy and outperform the Rocchio Bundling technique.
引用
收藏
页码:507 / 521
页数:14
相关论文
共 50 条
  • [1] A new intrusion detection system using support vector machines and hierarchical clustering
    Khan, Latifur
    Awad, Mamoun
    Thuraisingham, Bhavani
    [J]. VLDB JOURNAL, 2007, 16 (04): : 507 - 521
  • [2] A novel intrusion detection system based on hierarchical clustering and support vector machines
    Horng, Shi-Jinn
    Su, Ming-Yang
    Chen, Yuan-Hsin
    Kao, Tzong-Wann
    Chen, Rong-Jian
    Lai, Jui-Lin
    Perkasa, Citra Dwi
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2011, 38 (01) : 306 - 313
  • [3] Intrusion Detection using An Ensemble of Support Vector Machines
    Kumar, G. Kishor
    Kumar, R. Raja
    Basha, M. Suleman
    Reddy, K. Nageswara
    [J]. JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES, 2019, : 266 - 275
  • [4] Evaluating performance of intrusion detection system using support vector machines: Review
    Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, Malaysia
    不详
    不详
    不详
    [J]. Int. J. Secur. Appl., 9 (225-234):
  • [5] Evaluating Performance of Intrusion Detection System using Support Vector Machines: Review
    Mohammadpour, Leila
    Hussain, Mehdi
    Aryanfar, Alihossein
    Raee, Vahid Maleki
    Sattar, Fahad
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (09): : 225 - 234
  • [6] Intrusion detection using neural networks and support vector machines
    Mukkamala, S
    Janoski, G
    Sung, A
    [J]. PROCEEDING OF THE 2002 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, VOLS 1-3, 2002, : 1702 - 1707
  • [7] Hierarchical Clustering Using One-Class Support Vector Machines
    Lee, Gyemin
    [J]. SYMMETRY-BASEL, 2015, 7 (03): : 1164 - 1175
  • [8] An effective support vector machines (SVMs) performance using hierarchical clustering
    Awad, M
    Khan, L
    Bastani, F
    Yen, IL
    [J]. ICTAI 2004: 16TH IEEE INTERNATIONALCONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2004, : 663 - 667
  • [9] Hierarchical Core Vector Machines for Network Intrusion Detection
    Chen, Ye
    Pang, Shaoning
    Kasabov, Nikola
    Ban, Tao
    Kadobayashi, Youki
    [J]. NEURAL INFORMATION PROCESSING, PT 2, PROCEEDINGS, 2009, 5864 : 520 - +
  • [10] Intrusion Detection Using Principal Component Analysis and Support Vector Machines
    Mishra, Anukriti
    Cheng, Albert M. K.
    Zhang, Yunpeng
    [J]. 2020 IEEE 16TH INTERNATIONAL CONFERENCE ON CONTROL & AUTOMATION (ICCA), 2020, : 907 - 912