Call for Paper - April 2023 Edition
IJCA solicits original research papers for the April 2023 Edition. Last date of manuscript submission is March 20, 2023. Read More

Adaptive Distributed Intrusion Detection using Hybrid K-means SVM Algorithm

International Journal of Computer Applications
© 2013 by IJCA Journal
Volume 74 - Number 15
Year of Publication: 2013
Amit Bhardwaj
Parneet Kaur

Amit Bhardwaj and Parneet Kaur. Article: Adaptive Distributed Intrusion Detection using Hybrid K-means SVM Algorithm. International Journal of Computer Applications 74(15):33-37, July 2013. Full text available. BibTeX

	author = {Amit Bhardwaj and Parneet Kaur},
	title = {Article: Adaptive Distributed Intrusion Detection using Hybrid K-means SVM Algorithm},
	journal = {International Journal of Computer Applications},
	year = {2013},
	volume = {74},
	number = {15},
	pages = {33-37},
	month = {July},
	note = {Full text available}


Assuring secure and reliable operation of networks has become a priority research area these days because of ever growing dependency on network technology. Intrusion detection systems (IDS) are used as the last line of defense. Intrusion Detection System identifies patterns of known intrusions (misuse detection) or differentiates anomalous network data from normal data (anomaly detection). In this paper, a novel Intrusion Detection System (IDS) architecture is proposed which includes both anomaly and misuse detection approaches. The hybrid Intrusion Detection System architecture consists of centralized anomaly detection and distributed signature detection modules. Proposed anomaly detection module uses hybrid machine learning algorithm called k-means clustering support vector machine (KSVM). This hybrid system couples the benefits of low false-positive rate of signature-based intrusion detection system and anomaly detection system's ability to detect new unknown attacks.


  • Liu, Jianxiao, and Lijuan Li. "A Distributed Intrusion Detection System Based on Agents. " Computational Intelligence and Industrial Application, 2008. PACIIA'08. Pacific-Asia Workshop on. Vol. 1. IEEE, 2008.
  • Huang, Weijian, Yan An, and Wei Du. "A Multi-Agent-based Distributed Intrusion Detection System. " Advanced Computer Theory and Engineering (ICACTE), 2010 3rd International Conference on. Vol. 3. IEEE, 2010.
  • Eskin, Eleazar, Matthew Miller, Zhi-Da Zhong, George Yi, Wei-Ang Lee, and Salvatore Stolfo. "Adaptive model generation for intrusion detection systems. " (2000).
  • Hossain, Mahmood, and Susan M. Bridges. "A framework for an adaptive intrusion detection system with data mining. " 13th Annual Canadian Information Technology Security Symposium. 2001.
  • Fraley, Chris, and Adrian E. Raftery. "How many clusters? Which clustering method? Answers via model-based cluster analysis. " The computer journal 41. 8 (1998): 578-588.
  • (2002) The IEEE website. [Online]. Available: http://www. ieee. org/
  • Finley, Thomas, and Thorsten Joachims. "Supervised clustering with support vector machines. " Proceedings of the 22nd international conference on Machine learning. ACM, 2005.
  • Jaisankar, N. , Swetha Balaji, S. Lalita, and D. Sruthi. "Intrusion Detection System Using K-SVMeans Clustering Algorithm. "
  • Xia, Xiao-Lei, Michael R. Lyu, Tat-Ming Lok, and Guang-Bin Huang. "Methods of decreasing the number of support vectors via K-mean clustering. " In Advances in Intelligent Computing, pp. 717-726. Springer Berlin Heidelberg, 2005.
  • Vishwanathan, S. V. M. , and M. Narasimha Murty. "SSVM: a simple SVM algorithm. " Neural Networks, 2002. IJCNN'02. Proceedings of the 2002 International Joint Conference on. Vol. 3. IEEE, 2002.
  • Wang, Jiaqi, Xindong Wu, and Chengqi Zhang. "Support vector machines based on K-means clustering for real-time business intelligence systems. " International Journal of Business Intelligence and Data Mining 1, no. 1 (2005): 54-64.
  • Xie, Lixia, Dan Zhu, and Hongyu Yang. "Research on SVM based network intrusion detection classification. " In Fuzzy Systems and Knowledge Discovery, 2009. FSKD'09. Sixth International Conference on, vol. 7, pp. 362-366. IEEE, 2009.
  • Fang, Xiaozhao, Wei Zhang, Shaohua Teng, and Na Han. "A Research on Intrusion Detection Based on Support Vector Machines. " In Communications and Intelligence Information Security (ICCIIS), 2010 International Conference on, pp. 109-112. IEEE, 2010
  • Shuyue, Wu, Yu Jie, and Fan Xiaoping. "Research on Intrusion Detection Method Based on SVM Co-training. " In Intelligent Computation Technology and Automation (ICICTA), 2011 International Conference on, vol. 2, pp. 668-671. IEEE, 2011.
  • Lakhina, Anukool, Mark Crovella, and Christophe Diot. "Mining anomalies using traffic feature distributions. " In ACM SIGCOMM Computer Communication Review, vol. 35, no. 4, pp. 217-228. ACM, 2005.
  • Ben-Hur, Asa, David Horn, Hava T. Siegelmann, and Vladimir Vapnik. "A support vector clustering method. " In Pattern Recognition, 2000. Proceedings. 15th International Conference on, vol. 2, pp. 724-727. IEEE, 2000.
  • Denning, Dorothy E. "An intrusion-detection model. " Software Engineering, IEEE Transactions on 2 (1987): 222-232.
  • Huang, Ming-Yuh, Robert J. Jasper, and Thomas M. Wicks. "A large scale distributed intrusion detection framework based on attack strategy analysis. " Computer Networks 31, no. 23 (1999): 2465-2475
  • Lee, Wenke, Salvatore J. Stolfo, and Kui W. Mok. "Adaptive intrusion detection: A data mining approach. " Artificial Intelligence Review 14, no. 6 (2000): 533-567.
  • Botía, Juan A. , Jorge J. Gómez-Sanz, and Juan Pavón. "Intelligent data analysis for the verification of multi-agent systems interactions. " In Intelligent Data Engineering and Automated Learning–IDEAL 2006, pp. 1207-1214. Springer Berlin Heidelberg, 2006.
  • Arora, A. , D. B. Marshall, B. R. Lawn, and M. V. Swain. "Indentation deformation/fracture of normal and anomalous glasses. " Journal of Non-Crystalline Solids 31, no. 3 (1979): 415-428.
  • Axelsson, Stefan. "The base-rate fallacy and the difficulty of intrusion detection. " ACM Transactions on Information and System Security (TISSEC) 3, no. 3 (2000): 186-205.
  • Wen, Yi-Min, and Bao-Liang Lu. "A cascade method for reducing training time and the number of support vectors. " In Advances in Neural Networks–ISNN 2004, pp. 480-486. Springer Berlin Heidelberg, 2004.