CFP last date
20 May 2026
Reseach Article

Towards Real-Time DoS Detection: A Multi-Objective Optimized SVM Framework using Kernel Approximation and Dimensionality Reduction

by Loubna Ali, George Nartey Debrah, Youssef Ali
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 187 - Number 102
Year of Publication: 2026
Authors: Loubna Ali, George Nartey Debrah, Youssef Ali
10.5120/ijca7b271ca4ab8b

Loubna Ali, George Nartey Debrah, Youssef Ali . Towards Real-Time DoS Detection: A Multi-Objective Optimized SVM Framework using Kernel Approximation and Dimensionality Reduction. International Journal of Computer Applications. 187, 102 ( May 2026), 7-14. DOI=10.5120/ijca7b271ca4ab8b

@article{ 10.5120/ijca7b271ca4ab8b,
author = { Loubna Ali, George Nartey Debrah, Youssef Ali },
title = { Towards Real-Time DoS Detection: A Multi-Objective Optimized SVM Framework using Kernel Approximation and Dimensionality Reduction },
journal = { International Journal of Computer Applications },
issue_date = { May 2026 },
volume = { 187 },
number = { 102 },
month = { May },
year = { 2026 },
issn = { 0975-8887 },
pages = { 7-14 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume187/number102/towards-real-time-dos-detection-a-multi-objective-optimized-svm-framework-using-kernel-approximation-and-dimensionality-reduction/ },
doi = { 10.5120/ijca7b271ca4ab8b },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2026-05-17T02:29:05.458292+05:30
%A Loubna Ali
%A George Nartey Debrah
%A Youssef Ali
%T Towards Real-Time DoS Detection: A Multi-Objective Optimized SVM Framework using Kernel Approximation and Dimensionality Reduction
%J International Journal of Computer Applications
%@ 0975-8887
%V 187
%N 102
%P 7-14
%D 2026
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Denial-of-Service (DoS) attacks remain one of the most critical threats to modern network infrastructures, requiring intrusion detection systems (IDS) that are both highly accurate and computationally efficient. While Support Vector Machines (SVM) have demonstrated strong performance in detecting cyber attacks, their high computational complexity and long training time limit their applicability in real-time environments. This paper proposes a unified lightweight framework for real-time DoS detection based on a hybrid optimization of SVM. The framework integrates Principal Component Analysis (PCA) for dimensionality reduction, the Nystr¨om method for kernel approximation, and a linear SVM classifier to achieve nonlinear decision boundaries with significantly reduced computational cost. A multiobjective Bayesian optimization strategy is employed to jointly optimize key parameters, including feature dimension, kernel approximation size, and SVM hyperparameters, with the objective of maximizing detection recall while minimizing training time and model complexity. The proposed framework is evaluated on three benchmark intrusion detection datasets: UNSW-NB15, CIC-IDS2017, and BoTIoT, representing diverse network environments and attack distributions. Experimental results demonstrate that the optimized framework consistently improves detection performance while significantly reducing computational cost. Notably, the model achieves up to 99.97% recall on the BoT-IoT dataset while reducing training time by over 97%. On CIC-IDS2017, recall improved from 0.9331 to 0.9868, representing an absolute increase of 5.37 percentage points, while training time was reduced by 96%. These results confirm that the proposed approach effectively balances detection accuracy and computational efficiency, making it highly suitable for real-time intrusion detection systems. Furthermore, the consistent performance across multiple datasets demonstrates the generalizability and robustness of the proposed framework.

References
  1. L. Ali, C. B. Njima, D. Balaganesh, W. Alhasan, and A. Ali, “Cybersecurity – Enhancing digital transaction authentication through improved digital signature process,” in 2025 International Conference on Control, Automation and Diagnosis (ICCAD), Barcelona, Spain, 2025, pp. 1–6. doi: 10.1109/ICCAD64771.2025.11099180.
  2. L. Ali, S. Hajnulla, and N. Souliman, “Reducing the wireless sensor networks delay by reducing program complexity and using parallel processing mechanisms,” EMSJ Journal, 2022.
  3. L. Ali, H. Mathieu, and F. Biennier, “Monitoring and managing distributed networks using mobile agents,” in Proceedings of the 2nd International Conference on Information & Communication Technologies (ICTTA), Damascus, Syria, 2006, pp. 3377–3382. doi: 10.1109/ICTTA.2006.1684959.
  4. H. Mathieu, L. Ali, and F. Biennier, “A distributed management system: Towards proactive information system management in virtual enterprises,” in 12th IFAC Symposium on Information Control Problems in Manufacturing, Saint Etienne, France, 2006, pp. 659–665. Available: https://hal.science/hal-00196078.
  5. F. Biennier, L. Ali, and A. Legait, “Extended service integration: Towards manufacturing SLA,” in Advances in Production Management Systems, IFIP, vol. 246, Springer, Boston, MA, 2007. doi: 10.1007/978-0-387-74157-4 11.
  6. C. Cortes and V. Vapnik, “Support-vector networks,” Machine Learning, vol. 20, no. 3, pp. 273–297, 1995. doi: 10.1007/BF00994018.
  7. N. Cristianini and J. Shawe-Taylor, An Introduction to Support Vector Machines. Cambridge: Cambridge University Press, 2000. doi: 10.1017/CBO9780511801389.
  8. W. Wang, M. Zhu, X. Zeng, X. Ye, and Y. Sheng, “Malware traffic classification using convolutional neural network for representation learning,” in IEEE International Conference on Information Networking (ICOIN), 2017. doi: 10.1109/ICOIN.2017.7899468.
  9. B. Sch¨olkopf and A. J. Smola, Learning with Kernels. MIT Press, 2002. Available: https://mitpress.mit.edu/9780262194754/learning-withkernels/.
  10. L. Ali and F. Biennier, “Integration of security requirements in virtual enterprises,” in APMS Conference, 2005. Available: https://hal.science/hal-00393896/.
  11. I. T. Jolliffe, Principal Component Analysis. Springer, 2002. doi: 10.1007/b98835.
  12. C. K. I. Williams and M. Seeger, “Using the Nystr¨om method to speed up kernel machines,” in Advances in Neural Information Processing Systems, 2001. Available: https://papers.nips.cc/paper/2000/hash/ 19de10adbaa1b2ee13f77f679fa1483a-Abstract.html.
  13. A. Rahimi and B. Recht, “Random features for large-scale kernel machines,” in Advances in Neural Information Processing Systems, 2007. Available: https://papers.nips.cc/paper/2007/hash/ 013a006f03dbc5392effeb8f18fda755-Abstract.html.
  14. M. Ring, D. Wunderlich, D. Scheuring, D. Landes, and A. Hotho, “A survey of network-based intrusion detection data sets,” Computers & Security, vol. 86, pp. 147–167, 2019. doi: 10.1016/j.cose.2019.06.005.
  15. L. Ali, M. Jaber, S. Chaari, and F. Biennier, “Context-aware infrastructure to support distributed industrial services,” in Proceedings of the IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), 2007, pp. 716–719.
  16. N. Issa, D. Gruska, and L. Ali, “A hybrid GAM-based model for predicting vulnerability exploitation,” in Cooperative Information Systems (CoopIS 2025), Lecture Notes in Computer Science, vol. 15535, Springer, Cham, 2026. doi: 10.1007/978-3-032-15538-2 29.
  17. J. Snoek, H. Larochelle, and R. P. Adams, “Practical Bayesian optimization of machine learning algorithms,” in Advances in Neural Information Processing Systems, 2012. Available: https://papers.nips.cc/paper/2012/hash/ 05311655a15b75fab86956663e1819cd-Abstract.html.
  18. L. Ali, Gestionnaire d’infrastructure distribu´ee. Ph.D. dissertation, Institut National des Sciences Appliqu´ees de Lyon, 2008.
  19. N. Moustafa and J. Slay, “UNSW-NB15: A comprehensive data set for network intrusion detection systems,” in Military Communications and Information Systems Conference (MilCIS), 2015. doi: 10.1109/MilCIS.2015.7348942.
  20. I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, “Toward generating a new intrusion detection dataset and intrusion traffic characterization,” in Proceedings of ICISSP, 2018. doi: 10.5220/0006639801080116.
  21. N. Moustafa, “The BoT-IoT dataset,” Data in Brief, vol. 24, p. 103386, 2019. doi: 10.1016/j.dib.2019.103386
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion Detection System (IDS) Denial-of-Service (DoS) Detection Support Vector Machines (SVM) Kernel Approximation Nystr¨om Method Dimensionality Reduction Bayesian Optimization Real-Time Cybersecurity