Skip to main content

2018 | OriginalPaper | Buchkapitel

DoS Attacks Intrusion Detection Algorithm Based on Support Vector Machine

verfasst von : Lingren Wang, Jingbing Li, Jieren Cheng, Uzair Aslam Bhatti, Qianning Dai

Erschienen in: Cloud Computing and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

An intrusion detection method which is suitable for the characteristics of WSN (wireless sensor networks) is proposed intrusion detection based on single-class support vector machine. SVM (Support vector machines) can directly train and model the collected data sets, automatically generate detection models, and improve the efficiency of intrusion detection systems. A three-layer intrusion detection model is defined based on this algorithm. The model is more effectively for classifying the data collected by cluster member nodes into intrusion data and normal data. Finally, On the QualNet simulation platform, we implement SVM for the detection of DoS (denial of service) attacks intrusion detection algorithm. The result show that it is feasible to apply SVM to the design of intrusion detection system, with higher system detection rate and lower false alarm rate.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat White, B., Huson, L.: A peer-based hardware protocol for intrusion detection systems. In: Military Communications (2005) White, B., Huson, L.: A peer-based hardware protocol for intrusion detection systems. In: Military Communications (2005)
2.
Zurück zum Zitat Shi, E., Perrig, A.: Designing secure sensor networks. IEEE Wirel. Commun. 11, 38–43 (2006) Shi, E., Perrig, A.: Designing secure sensor networks. IEEE Wirel. Commun. 11, 38–43 (2006)
3.
Zurück zum Zitat Heady, R: The Architecture of a Network-Level Intrusion Detection System, 1st edn., p. 18. Department of Computer Science, Mexico (1990) Heady, R: The Architecture of a Network-Level Intrusion Detection System, 1st edn., p. 18. Department of Computer Science, Mexico (1990)
4.
Zurück zum Zitat Patal, S.C., Sanyal, P.: Securing SCADA systems. Inf. Manag. Comput. Secur. 16(4), 398–414 (2008)CrossRef Patal, S.C., Sanyal, P.: Securing SCADA systems. Inf. Manag. Comput. Secur. 16(4), 398–414 (2008)CrossRef
6.
Zurück zum Zitat Park, Y.: A Statistical Process Control Approach for Network Instrusion Detection. Georgia Instrusion of Technology, Atlanta (2005) Park, Y.: A Statistical Process Control Approach for Network Instrusion Detection. Georgia Instrusion of Technology, Atlanta (2005)
7.
Zurück zum Zitat Qing, W.: Jiulun FAN: Smooth support vector machine based on piecewise function. J. China Univ. Posts Telecommun. 05, 124–130 (2013) Qing, W.: Jiulun FAN: Smooth support vector machine based on piecewise function. J. China Univ. Posts Telecommun. 05, 124–130 (2013)
8.
Zurück zum Zitat Abdullah, M.Y.: Security and Energy Performance Optimization in Wireless Sensor Networks (2010) Abdullah, M.Y.: Security and Energy Performance Optimization in Wireless Sensor Networks (2010)
9.
Zurück zum Zitat Kooijman, M.: Building Wireless Sensor Networks Using Arduino. Packt Publishing, Birmingham (2015) Kooijman, M.: Building Wireless Sensor Networks Using Arduino. Packt Publishing, Birmingham (2015)
10.
Zurück zum Zitat Chmielewska, I.: Dos personas. Oceano Travesia (2009) Chmielewska, I.: Dos personas. Oceano Travesia (2009)
11.
Zurück zum Zitat Tian, Y.J., Ju, X.C., Qi, Z.Q.: Improved twin support vector machine. Sci. China Math. 57(02), 201–216 (2014)MathSciNetCrossRef Tian, Y.J., Ju, X.C., Qi, Z.Q.: Improved twin support vector machine. Sci. China Math. 57(02), 201–216 (2014)MathSciNetCrossRef
12.
Zurück zum Zitat Nakamori, Y.: Forecasting Nikkei 225 index with support vector machine. J. Syst. Sci. Complex. 16(04), 3–11 (2003)MathSciNetMATH Nakamori, Y.: Forecasting Nikkei 225 index with support vector machine. J. Syst. Sci. Complex. 16(04), 3–11 (2003)MathSciNetMATH
14.
Zurück zum Zitat Namnabat, M., Homayounpour, M.M.: Refining segmental boundaries using support vector machine. In: 2006 8th International Conference on Signal Processing. Institute of Electrical and Electronics Engineers, Inc. (2006) Namnabat, M., Homayounpour, M.M.: Refining segmental boundaries using support vector machine. In: 2006 8th International Conference on Signal Processing. Institute of Electrical and Electronics Engineers, Inc. (2006)
15.
Zurück zum Zitat Dybala, J.: Comparative analysis of support vector machine and nearest boundary vector classifier. In: The 8th International Conference on Reliability, Maintainability and Safety (ICRMS 2009) (2009) Dybala, J.: Comparative analysis of support vector machine and nearest boundary vector classifier. In: The 8th International Conference on Reliability, Maintainability and Safety (ICRMS 2009) (2009)
16.
Zurück zum Zitat Xue, X.H., Yang, X.G., Chen, X.: Application of a support vector machine for prediction of slope stability. Sci. China Technol. Sci. 57(12), 89–96 (2014)CrossRef Xue, X.H., Yang, X.G., Chen, X.: Application of a support vector machine for prediction of slope stability. Sci. China Technol. Sci. 57(12), 89–96 (2014)CrossRef
Metadaten
Titel
DoS Attacks Intrusion Detection Algorithm Based on Support Vector Machine
verfasst von
Lingren Wang
Jingbing Li
Jieren Cheng
Uzair Aslam Bhatti
Qianning Dai
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-030-00018-9_26