Call for Paper - March 2023 Edition
IJCA solicits original research papers for the March 2023 Edition. Last date of manuscript submission is February 20, 2023. Read More

Cyber Attack Classification based on Parallel Support Vector Machine

Print
PDF
IJCA Proceedings on National Conference on Recent Trends in Computing
© 2012 by IJCA Journal
NCRTC - Number 4
Year of Publication: 2012
Authors:
Mital Patel
Yogdhar Pandey

Mital Patel and Yogdhar Pandey. Article: Cyber Attack Classification based on Parallel Support Vector Machine. IJCA Proceedings on National Conference on Recent Trends in Computing NCRTC(4):12-14, May 2012. Full text available. BibTeX

@article{key:article,
	author = {Mital Patel and Yogdhar Pandey},
	title = {Article: Cyber Attack Classification based on Parallel Support Vector Machine},
	journal = {IJCA Proceedings on National Conference on Recent Trends in Computing},
	year = {2012},
	volume = {NCRTC},
	number = {4},
	pages = {12-14},
	month = {May},
	note = {Full text available}
}

Abstract

Cyber attack is becoming a critical issue of organizational information systems. A number of cyber attack detection methods have been introduced with different levels of success that is used as a countermeasure to preserve data integrity and system availability from attacks. The classification of attacks against computer network is becoming a harder problem to solve in the field of network security. This paper describes a Subset Selection Decision Fusion method to choose features (attributes) of KDDCUP 1999 intrusion detection dataset. Selection algorithm for distributed cyber attack detection and classification is proposed. Different types of attacks together with the normal condition of the network are modeled as different classes of the network data. We proposed Parallel Support Vector Machine (PSVM) algorithm for detection and classification of cyber attack dataset. Support Vector Machines (SVM) are the classifiers which were originally designed for binary c1assificatio. n. The c1assificatioin applications can solve multi-class problems. Result shows that PSVM gives more detection accuracy for classes and comparable to false alarm rate.

References

  • KDD Cup 1999. Available on: http://kdd. ics. uci. edu/databases/kddcup99/ kddcup99. html, October 2007.
  • Snehal A. Mulay, P. R. Devale, G. v. Garje," Intrusion Detection System using Support Vector Machine and Decision Tree", International Journal of Computer Applications (0975 - 8887) Volume 3 - No. 3, June 2010
  • Latifur Khan. Mamoun Awad, Bhavani Thuraisingham, "A new intrusion detection system using support vector machines and hierarchical clustering",The VLDB Journal DOl 1O. 1007/s00778- 006-0002. 2007.
  • YMahbod Tavallaee, Ebrahim Bagheri, Wei Lu, and Ali A. Ghorbani. "A detailed analysis of KDD CUP'99 data set", IEEE-2009.
  • http://kdd. ics. uci. eduidatabaseslkddcup99/kddcup99. html
  • G. MeeraGandhi, Kumaravel Appavoo, S. K. Srivatsa," Effective Network Intrusion Detection using Classifiers Decision Trees and Decision rules" Int. J. Advanced Networking and Applications Volume: 02, Issue: 03, Pages: 686-692 ,2010
  • P. Srinivasulu, R. Satya Prasad and I. Ramesh Babu," Intelligent Network Intrusion Detection Using DT and BN Classification Techniques" Int. J. Advance. Soft Comput. Appl. , Vol. 2, No. 1, March 2010 ISSN 2074-8523; Copyright © ICSRS Publication, 2010, www. i-csrs. org
  • Shailendra Singh Member, IEEE, IAENG, Sanjay Agrawal, Murtaza,A. Rizvi and Ramjeevan Singh Thakur, "Improved Support Vector Machine for Cyber Attack Detection", Proceedings of The World Congress on Engineering and Computer Science 2011 Vol I WCECS 2011, October 19-21, 2011, San Francisco, USA
  • Hoa Dinh Nguyen, Qi Cheng," An Efficient Feature Selection Method For Distributed Cyber Attack Detection and Classification",978•1-4244-9848•2/11 $26. 00©2011 IEEE
  • Dr. Adnan Mohsin Abdulazeez Brifcani & Adel Sabry Issa," Intrusion Detection and Attack No. 2, 2011
  • S. J. Stolfo, W. Fan, W. Lee, A. Prodromidis, and P. K. Chan, "Costbased modeling for fraud and intrusion detection: Results from the jam project," discex, vol. 02, p. 1130, 2000.
  • R. P. Lippmann, D. J. Fried, I. Graf, J. W. Haines, K. R. Kendall,D. McClung, D. Weber, S. E. Webster, D. Wyschogrod, R K. Cunningham, and M. A. Zissman "Evaluating intrusion Detection systems: The 1998 darpa off-line intrusion detection evaluation," discex, vol. 02, p. 1012, 2000.
  • Xiong, Sheng-Wu, Liu Hong-bing, Niu Xiao-xiao, Fuzzy support vector machines based on FCM clustering. Proceddings of the fourth international conference on Machine Learning and Cybernetics, Guangzhou, China, Aug 18-21, IEEE, p. 2608-2613, 2005.
  • A. K. Ghosh and A. Schwartzbard. "A study in Using Neural Networks for Anomaly and Misuse detection" Proceeding of the 8th USENIX Security Symposium, pp. 23-36. Washington, D. C. US. 1999
  • Mukkamala S. , Sung AH, Abraham A. Modeling Inrusion Detection Systems Using linear genetic programming approach, The 17th international conference on industrial & engineering applications of artificial intelligence and expert systems, innovation in applied artificial intelligence.
  • W. Lee, S. J. Stolfo and K. Mok. Data mining in work flow environments: Experience in intrusion detection, Proceedings of the Conference on Knowledge Discovery and Data Mining (KDD-99), 1999.
  • Liu Yi-hung, Chen Yen-ting, face recognition using total margin based adaptive fuzzy support vector machines. IEEE Transactions on Neural Networks, 18(1): 178-192, 2007.