skip to main content
10.1145/2490428.2490453acmconferencesArticle/Chapter ViewAbstractPublication PagessecuritConference Proceedingsconference-collections
research-article

adsvm: pre-processor plug-in using support vector machine algorithm for Snort

Published:17 August 2012Publication History

ABSTRACT

Anomaly detection has been considered as a critical problem in any application area. In computer networks, anomaly detection is important as any kind of abnormal behavior in the network data is considered harmful to the end user. Snort is an open source NIDS tool that uses misuse detection method for intrusion detection. There are many pre-processor and detection plug-ins for Snort. Pre-processor plug-ins is meant to process the packet captured but some are meant for detection of anomalies also. Hence we are implementing a pre-processor plug-in for Snort meant for anomaly detection approach using the machine learning algorithm support vector machine and integrating into Snort. The anomalies detected by the plug-in are new compared with the anomalies detected by the available pre-processor plug-ins. Also we created an intrusion detection dataset which is important for any process using the machine learning algorithms. The detection rate of the plug-in is high and the false alarm rate is low which is very important for any anomaly detection system. Hence integrating this plug-in into Snort helps to improve the detection rate of the plug-ins that can be run in packet sniffer mode.

References

  1. Martin Roesch, "Snort -- Light weight Intrusion Detection for Networks", Proceedings of lisa '99: 13th systems administration conference, Seattle, Washington, USA, November 7--12, 1999 Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Pavel Laskov, Konrad RIECK and Klaus-Robert MÜLLER, "Machine Learning for Intrusion Detection", a Fraunhofer Institute FIRST.IDA, University of Tübingen, Wilhelm-Schickard-Institute for Computer Science Technical University of BerlinGoogle ScholarGoogle Scholar
  3. zhangxue-qin, gu chun-hua and linjia-jun," Intrusion detection system based on feature selection and support vector machine", east china university of science and technologyGoogle ScholarGoogle Scholar
  4. Brian Eugene, Lavender B. S." Implementation Of Genetic Algorithms Into A Network Intrusion Detection System (Netga), And Integration Into Nprobe", California Polytechnic State University, San Luis Obispo, 1993Google ScholarGoogle Scholar
  5. Kamran Shafi, Hussein A. Abbass, "A Methodology to Evaluate Supervised Learning Algorithms for Intrusion Detection", Weiping Zhu School of Engineering and Information Technology (SEIT) Univiersity of New South Wales, Australian Defence Force Academy, Canberra ACT 2600Google ScholarGoogle Scholar
  6. Chin-Jen Lin, Formulations of Support Vector Machines: A Note from an Optimization Point of View, Department of Computer Science and Information Engineering, National Taiwan UniversityGoogle ScholarGoogle Scholar
  7. Philippe Bogaerts, Alias Xxradar, "HPING Tutorial "By. Version 1.5 24-08-2003.Google ScholarGoogle Scholar
  8. Detecting The Unknown With Snort And The Statistical Packet Anomaly Detection Engine (Spade)Simon Biles Computer Security Online Ltd.Google ScholarGoogle Scholar
  9. Chih-Wei Hsu, Chih-Chung Chang, and Chih-Jen Lin, "A Practical Guide to Support Vector Classification", Department of Computer Science, National Taiwan University, Taipei 106, TaiwanGoogle ScholarGoogle Scholar

Index Terms

  1. adsvm: pre-processor plug-in using support vector machine algorithm for Snort

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            SecurIT '12: Proceedings of the First International Conference on Security of Internet of Things
            August 2012
            266 pages
            ISBN:9781450318228
            DOI:10.1145/2490428

            Copyright © 2012 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 17 August 2012

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader