CFP last date
20 May 2024
Reseach Article

A Survey on SVM Classifiers for Intrusion Detection

by R. Ravinder Reddy, B. Kavya, Y Ramadevi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 98 - Number 19
Year of Publication: 2014
Authors: R. Ravinder Reddy, B. Kavya, Y Ramadevi
10.5120/17294-7779

R. Ravinder Reddy, B. Kavya, Y Ramadevi . A Survey on SVM Classifiers for Intrusion Detection. International Journal of Computer Applications. 98, 19 ( July 2014), 34-44. DOI=10.5120/17294-7779

@article{ 10.5120/17294-7779,
author = { R. Ravinder Reddy, B. Kavya, Y Ramadevi },
title = { A Survey on SVM Classifiers for Intrusion Detection },
journal = { International Journal of Computer Applications },
issue_date = { July 2014 },
volume = { 98 },
number = { 19 },
month = { July },
year = { 2014 },
issn = { 0975-8887 },
pages = { 34-44 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume98/number19/17294-7779/ },
doi = { 10.5120/17294-7779 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:26:39.243856+05:30
%A R. Ravinder Reddy
%A B. Kavya
%A Y Ramadevi
%T A Survey on SVM Classifiers for Intrusion Detection
%J International Journal of Computer Applications
%@ 0975-8887
%V 98
%N 19
%P 34-44
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Intrusion detection is an emerging area of research in the computer security and networks with the growing usage of internet in everyday life. An Intrusion Detection is an important in assuring security of network and its different resourses. Intrusion detection attempts to detect computer attacks by examining various data records observed in processes on the network. Recently data mining methods have gained importance in addressing network security issues, including network intrusion detection. Intrusion detection systems aim to identify attacks with a high detection rate and a low false positive. Here, we are going to propose Intrusion Detection System using data mining technique: Support Vector Machine (SVM). Support vector machine-based intrusion detection methods are increasingly being researched because it can detect novel attacks. But solving a support vector machine problem is a typical quadratic optimization problem, which is influenced by the feature dimensions and number of training samples. In this paper how the support vector machines are used for intrusion detection are described and finally proposed a solution to the inrusion detection system.

References
  1. Intrusion Detection – Wikipedia, the free encyclopedia. Available at http://en. wikipedia. org/wiki/Intrusion detection
  2. Axelsson, S. : Research in intrusion detection systems: a survey. Technical Report TR 98-17 (revised in 1999). Chalmers University of Technology, Goteborg, Sweden(1999)
  3. Lee W and Stolfo S. , "Data Mining techniques for intrusion detection", In: Proc. of the 7th USENIX security symposium, San Antonio, TX, 1998
  4. Dokas P, Ertoz L, Kumar V, Lazarevie A, Srivastava J, and Tan P. , "Data Mining for intrusion detection", In: Proc. of NSF workshop on next generation data mining, 2002
  5. de Boer P. , Pels M. "Host-Based Intrusion Detection Systems". Availablehttp://staff. science. uva. nl/~delaat/snb-2004-2005/p19/report. pdf
  6. Scarfone K. , Mell P. "Guide to Intrusion Detection and Prevention Systems". Available at http://csrc. nist. gov/publications/nistpubs/80094/SP80094. pdf, 2007.
  7. C. Cortes and V. Vapnik, "Support-vector network," Machine Learning, vol. 20, pp. 273–297, 1995
  8. S. Mukkamala, G. 1. Janoski, A. H. Sung. Intrusion Detection Using Neural Networks and Support Vector Machines. In Proceedings of IEEE International Joint Conference on Neural Networks, Vol 2, Honolulu, 2002. 5, pp. 1702-1707.
  9. Dong Seong Kim, Ha-Nam Nguyen,Jong Sou Park Genetic algorithm to improve SVM based network intrusion detection system. In 19th International Conference on Advanced Information Networking and Applications, Vol. 2, Taiwan, 2005. 3, pp. 155–158.
  10. Hansung Lee, Jiyoung Song, Daihee Park. Intrusion Detection System Based on Multi-class SVM. Lecture Notes in Computer Science, vol. 3642, Springer Berlin, 2005. 9, pp. 511-519.
  11. V. N. Vapnik. The nature of statistical learning theory. Springer Verlag, New York. NY, 1995
  12. CannadyJ. ,"Artificial Neural Networks for Misuse Detection. National Information Systems Security Conference", (1998).
  13. C. J. C. Burges, A tutorial on support vector machines for pattern recognition. Data Mining and Knowledge Discovery, vol 2(2), Springer US, 1998, pp. 121-167.
  14. K. -P. Lin and M. -S. Chen, "Efficient kernel approximation for large-scale support vector machine classification," in Proceedings of the Eleventh SIAM International Conference on Data Mining, 2011, pp. 211–222
  15. H. Byun, S. W. Lee, A survey on pattern recognition applications of support vector machines, International Journal of Pattern Recognition and Artificial Intelligence 17 (2003) 459–486
  16. Amit Konar, Uday K. Chakraborty, Paul P. Wang, Supervised learning on a fuzzy Petri net, Information Sciences 172 (2005) 397–416
  17. B. Scho ¨lkopf, Estimating the support of a high-dimensional distribution, Neural Computation 13 (2001) 1443–147
  18. K. A. Heller, K. M. Svore, A. Keromytis, S. J. Stolfo, One class support vector machines for detecting anomalous windows registry accesses, in: Proc. The workshop on Data Mining for Computer Security, Melbourne, FL, 2003, pp. 281–289
  19. T. Joachims, Estimating the Generalization Performance of an SVM efficiently, in: Proc. the Seventeenth International Conference on Machine Learning, San Francisco, CA, 2000, pp. 431–438
  20. Hsu, C. , Lin, C. , "A comparison on methods for multi-class support vector machines", Technical report, Department of Computer Science and Information Engineering, National Taiwan University, Taipei, Taiwan, (2001)
  21. Weston, J. and Watkins, C. Support vector machines for multi-class pattern recognition. Proceedings 7th European Symposium on Artificial Neural Networks, 1999.
  22. Xu, P. and Chan, A. An efficient algorithm on multi-class support vector machine model selection. Proceedings of the International Joint Conference on Neural Networks, 4:3229–3232, 2003
  23. KDDCUP'99dataset,availableat http://kdd. ics. uci. edu/dataset/kddcup99/kddcup99. htm
  24. B. V. Nguyen, An Application of Support Vector Machines to Anomaly Detection, CS681 (Research in Computer Science – Support Vector Machine) report, 2002
  25. S. Dumais, H. Chen, Hierarchical classification of Web content, in: Proc. The 23rd annual international ACM SIGIR conference on Research and development in information retrieval, Athens, Greece, 2000, pp. 256–263
  26. D. Srivastava, L. Bhambhu, Data classification using support vector machine, J. Theoret. Appl. Inf. Technol. 12 (1) (2010) 1–7
  27. C. W. Hsu, C. C. Chang, C. J. Lin, A Practical Guide to Support Vector Classification[EB/OL], 2010 http://www. csie. ntu. edu. tw/?cjlin/papers/guide/guide. pdf
  28. S. -J. Horng, P. Fan, Y. -P. Chou, Y. -C. Chang, Y. Pan, A feasible intrusion detector for recognizing IIS attacks based on neural networks. Computers & Security, 2008. 27(3-4): 84-10
  29. S. S. Keerthi and C. -J. Lin, "Asymptotic behaviors of support vector machines with Gaussian kernel," Neural Computation, vol. 15,no. 7, pp. 1667–1689, 2003.
  30. E. M. Gertz and J. D. Griffin, "Support vector machine classifiers for large data sets," Argonne National Laboratory, Tech. Rep. ANL/MCS-TM-289, 2005.
  31. K. Crammer and Y. Singer. On the algorithmic implementation of multiclass kernel-based vector machines. Journal of Machine Learning Research, 2:265–292, 2001.
  32. Joachims, T. , Making Large-Scale SVM Learning Practical. Advances in Kernel Methods – Support Vector Learning, 1999.
  33. N. Cristiani and J. Shawe-Taylor. An Introduction to Support Vector Machines and other kernel-based learning methods. Cambridge, Cambridge University Press, 2000.
  34. S. Abe. Support Vector Machines for pattern classification. London, Springer, 2005.
Index Terms

Computer Science
Information Sciences

Keywords

Kernel functions soft margins Multi class SVM