Skip to main content
Erschienen in: Soft Computing 5/2015

01.05.2015 | Methodologies and Application

A novel SVM by combining kernel principal component analysis and improved chaotic particle swarm optimization for intrusion detection

verfasst von: Fangjun Kuang, Siyang Zhang, Zhong Jin, Weihong Xu

Erschienen in: Soft Computing | Ausgabe 5/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A novel support vector machine (SVM) model by combining kernel principal component analysis (KPCA) with improved chaotic particle swarm optimization (ICPSO) is proposed to deal with intrusion detection. The proposed method, in which multi-layer SVM classifier is employed to estimate whether the action is an attack, KPCA is applied as a preprocessor of SVM to reduce the dimension of feature vectors and shorten training time. To shorten the training time and improve the performance of SVM, N-RBF is employed to reduce the noise generated by feature differences, and ICPSO is presented to optimize the punishment factor C, kernel parameters \(\sigma \) and the tube size \(\varepsilon \) of SVM, which introduces chaos optimization and premature processing mechanism. Experimental results illustrate that the improved SVM model has faster computational time and higher predictive accuracy, and it can also shorten the training time and improve the performance of SVM.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Chen ZG, Ren HD, Du XJ (2008) Minimax probability machine classifier with feature extraction by kernel PCA for intrusion detection. In: Proceedings of WiCOM08, pp 1–4 Chen ZG, Ren HD, Du XJ (2008) Minimax probability machine classifier with feature extraction by kernel PCA for intrusion detection. In: Proceedings of WiCOM08, pp 1–4
Zurück zum Zitat Chimphlee W, Addullah AH, Sap MNM et al (2006) Anomaly-based intrusion detection using fuzzy rough clustering. In: Proceedings of ICHIT06, pp 329–334 Chimphlee W, Addullah AH, Sap MNM et al (2006) Anomaly-based intrusion detection using fuzzy rough clustering. In: Proceedings of ICHIT06, pp 329–334
Zurück zum Zitat Ding M, Tian Z, Xu H (2009) Adaptive kernel principal analysis for online feature extraction. Proc World Acad Sci Eng Technol 59:288–293 Ding M, Tian Z, Xu H (2009) Adaptive kernel principal analysis for online feature extraction. Proc World Acad Sci Eng Technol 59:288–293
Zurück zum Zitat Eskin E (2000) Anomaly detection over noisy data using learned probability distributions. In: Proceedings of ICML2000, pp 255–262 Eskin E (2000) Anomaly detection over noisy data using learned probability distributions. In: Proceedings of ICML2000, pp 255–262
Zurück zum Zitat Fei R, Hu L, Liang H (2008) Using density-based incremental clustering for anomaly detection. In: Proceedings of CSSE08, pp 986–989 Fei R, Hu L, Liang H (2008) Using density-based incremental clustering for anomaly detection. In: Proceedings of CSSE08, pp 986–989
Zurück zum Zitat Horng SJ, Su MY, Chen YH et al (2011) A novel intrusion detection system based on hierarchical clustering and support vector machines. Expert Syst Appl 38:306–313CrossRef Horng SJ, Su MY, Chen YH et al (2011) A novel intrusion detection system based on hierarchical clustering and support vector machines. Expert Syst Appl 38:306–313CrossRef
Zurück zum Zitat Hu W, Liao Y, Vemuri V (2003) Robust support vector machines for anomaly detection in computer security. In: Proceedings of ICMLA03, pp 23–24 Hu W, Liao Y, Vemuri V (2003) Robust support vector machines for anomaly detection in computer security. In: Proceedings of ICMLA03, pp 23–24
Zurück zum Zitat Kavitha B, Karthikeyan S, Maybell PS (2012) An ensemble design of intrusion detection system for handling uncertainty using neutrosophic logic classifier. Knowl Based Syst 28:88–96CrossRef Kavitha B, Karthikeyan S, Maybell PS (2012) An ensemble design of intrusion detection system for handling uncertainty using neutrosophic logic classifier. Knowl Based Syst 28:88–96CrossRef
Zurück zum Zitat Khan L, Awad M, Thuraisingham B (2007) A new intrusion detection system using support vector machines and hierarchical clustering. Int J Very Large Data Bases 16:507–521CrossRef Khan L, Awad M, Thuraisingham B (2007) A new intrusion detection system using support vector machines and hierarchical clustering. Int J Very Large Data Bases 16:507–521CrossRef
Zurück zum Zitat Kolias C, Kambourakis G, Maragoudakis M (2011) Swarm intelligence in intrusion detection: a survey. Comput Secur 30:625–642CrossRef Kolias C, Kambourakis G, Maragoudakis M (2011) Swarm intelligence in intrusion detection: a survey. Comput Secur 30:625–642CrossRef
Zurück zum Zitat Kuang FJ, Xu WH, Zhang SY et al (2012) A novel approach of KPCA and SVM for intrusion detection. J Comput Inform Syst 8(8):3237–3244 Kuang FJ, Xu WH, Zhang SY et al (2012) A novel approach of KPCA and SVM for intrusion detection. J Comput Inform Syst 8(8):3237–3244
Zurück zum Zitat Kuang FJ, Xu WH, Zhang SY (2014) A novel hybrid KPCA and SVM with GA model for intrusion detection. Appl Soft Comput 18:178–184CrossRef Kuang FJ, Xu WH, Zhang SY (2014) A novel hybrid KPCA and SVM with GA model for intrusion detection. Appl Soft Comput 18:178–184CrossRef
Zurück zum Zitat Lee JH, Lee JH, Sohn SG, et al (2008) Effective value of decision tree with KDD 99 intrusion detection datasets for intrusion detection system. In: Proceedings of ICACT08, pp 1170–1175 Lee JH, Lee JH, Sohn SG, et al (2008) Effective value of decision tree with KDD 99 intrusion detection datasets for intrusion detection system. In: Proceedings of ICACT08, pp 1170–1175
Zurück zum Zitat Li B, Jiang WS (1997) Chaos optimization method and its application. Control Theory Appl 14(4):613–615 Li B, Jiang WS (1997) Chaos optimization method and its application. Control Theory Appl 14(4):613–615
Zurück zum Zitat Peddabachigari S, Abraham A, Grosan C (2007) Modeling intrusion detection system using hybrid intelligent systems. J Netw Comput Appl 30(1):114–132CrossRef Peddabachigari S, Abraham A, Grosan C (2007) Modeling intrusion detection system using hybrid intelligent systems. J Netw Comput Appl 30(1):114–132CrossRef
Zurück zum Zitat Schölkopf B, Smola A, Müller KR (1998) Nonlinear component analysis as a Kernel eigenvalue problem. Neural Comput 10(5):1299–1319CrossRef Schölkopf B, Smola A, Müller KR (1998) Nonlinear component analysis as a Kernel eigenvalue problem. Neural Comput 10(5):1299–1319CrossRef
Zurück zum Zitat Shafi K, Abbass HA (2009) An adaptive genetic based signature learning system for intrusion detection. Expert Syst Appl 36(10):12036–12043CrossRef Shafi K, Abbass HA (2009) An adaptive genetic based signature learning system for intrusion detection. Expert Syst Appl 36(10):12036–12043CrossRef
Zurück zum Zitat Shon T, Kim Y, Lee C, Moon J (2005) A machine learning framework for network anomaly detection using SVM and GA. In: Proceedings of IWIAS05, pp 176–183 Shon T, Kim Y, Lee C, Moon J (2005) A machine learning framework for network anomaly detection using SVM and GA. In: Proceedings of IWIAS05, pp 176–183
Zurück zum Zitat Srinoy S (2007) Intrusion detection model based on particle swarm optimization and support vector machine. In: Proceedings of CISDA07, pp 186–192 Srinoy S (2007) Intrusion detection model based on particle swarm optimization and support vector machine. In: Proceedings of CISDA07, pp 186–192
Zurück zum Zitat Srivastava D, Bhambhu L (2010) Data classification using support vector machine. J Theor Appl Inf Technol 12(1):1–7 Srivastava D, Bhambhu L (2010) Data classification using support vector machine. J Theor Appl Inf Technol 12(1):1–7
Zurück zum Zitat Tsai CF, Hsu YF, Lin CY, Lin WY (2009) Intrusion detection by machine learning: a review. Expert Syst Appl 36:11994–12000CrossRef Tsai CF, Hsu YF, Lin CY, Lin WY (2009) Intrusion detection by machine learning: a review. Expert Syst Appl 36:11994–12000CrossRef
Zurück zum Zitat Tsai CF, Lin CY (2010) A triangle area based nearest neighbors approach to intrusion detection. Pattern Recognit 43(1):222–229CrossRefMATHMathSciNet Tsai CF, Lin CY (2010) A triangle area based nearest neighbors approach to intrusion detection. Pattern Recognit 43(1):222–229CrossRefMATHMathSciNet
Zurück zum Zitat Wang J, Hong X, Ren R, Li T (2009) A real-time intrusion detection system based on PSO-SVM. In: Proceedings of IWISA09, pp 319–321 Wang J, Hong X, Ren R, Li T (2009) A real-time intrusion detection system based on PSO-SVM. In: Proceedings of IWISA09, pp 319–321
Zurück zum Zitat Wang G, Hao JX, Ma J, Huang LH (2010) A new approach to intrusion detection using artificial neural networks and fuzzy clustering. Expert Syst Appl 37:6225–6232 Wang G, Hao JX, Ma J, Huang LH (2010) A new approach to intrusion detection using artificial neural networks and fuzzy clustering. Expert Syst Appl 37:6225–6232
Zurück zum Zitat Wang W, Battiti R (2006) Identifying intrusions in computer networks with principal component analysis. In: Proceedings of ARES06, pp 270–279 Wang W, Battiti R (2006) Identifying intrusions in computer networks with principal component analysis. In: Proceedings of ARES06, pp 270–279
Zurück zum Zitat Wu SX, Banzhaf W (2010) Use of computational intelligence in intrusion detection systems: a review. Appl Soft Comput 10(1):1–35CrossRefMATH Wu SX, Banzhaf W (2010) Use of computational intelligence in intrusion detection systems: a review. Appl Soft Comput 10(1):1–35CrossRefMATH
Zurück zum Zitat Yang P, Zhu QS (2011) Finding key attribute subset in dataset for outlier detection. Knowl Based Syst 24(2):269–274CrossRef Yang P, Zhu QS (2011) Finding key attribute subset in dataset for outlier detection. Knowl Based Syst 24(2):269–274CrossRef
Zurück zum Zitat Zhang MH, Li G (2012) Network intrusion detection based on least squares support vector machine and chaos particle swarm optimization algorithm. J Converg Inf Technol 7(4):169–173 Zhang MH, Li G (2012) Network intrusion detection based on least squares support vector machine and chaos particle swarm optimization algorithm. J Converg Inf Technol 7(4):169–173
Zurück zum Zitat Zhang Z, Shen H (2005) Application of online-training SVMs for real-time intrusion detection with different considerations. Comput Commun 28(12):1428–1442CrossRef Zhang Z, Shen H (2005) Application of online-training SVMs for real-time intrusion detection with different considerations. Comput Commun 28(12):1428–1442CrossRef
Metadaten
Titel
A novel SVM by combining kernel principal component analysis and improved chaotic particle swarm optimization for intrusion detection
verfasst von
Fangjun Kuang
Siyang Zhang
Zhong Jin
Weihong Xu
Publikationsdatum
01.05.2015
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 5/2015
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-014-1332-7

Weitere Artikel der Ausgabe 5/2015

Soft Computing 5/2015 Zur Ausgabe