Skip to main content
Top
Published in: Arabian Journal for Science and Engineering 4/2020

02-07-2019 | Research Article – Special Issue - Intelligent Computing and Interdisciplinary Applications

Analysis of Support Vector Machine-based Intrusion Detection Techniques

Authors: Bhoopesh Singh Bhati, C. S. Rai

Published in: Arabian Journal for Science and Engineering | Issue 4/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

From the last few decades, people do various transaction activities like air ticket reservation, online banking, distance learning, group discussion and so on using the internet. Due to explosive growth of information exchange and electronic commerce in the recent decade, there is a need to implement some security mechanisms in order to protect sensitive information. Detection of any intrusive behavior is one of the most important activity for protecting our data and assets. Various intrusion detection systems are incorporated in the network for detecting intrusive behavior. In this paper, an analytical study of support vector machine (SVM)-based intrusion detection techniques is presented. Here, the methodology involves four major steps, namely, data collection, preprocessing, SVM technique for training and testing and decision. The simulated results have been analyzed based on overall detection accuracy, Receiver Operating Characteristic and (ROC) Confusion Matrix. NSL-KDD dataset is used to analyze the performance of SVM techniques. NSL-KDD dataset is a benchmark for intrusion detection technique and contains huge amount of network records. The analyzed results show that Linear SVM, Quadratic SVM, Fine Gaussian SVM and Medium Gaussian SVM give 96.1%, 98.6%, 98.7% and 98.5% overall detection accuracy, respectively.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
3.
go back to reference Lundin, E.; Jonsson, E.: Survey of intrusion detection research. Chalmers University of Technology, Gothenburg (2002) Lundin, E.; Jonsson, E.: Survey of intrusion detection research. Chalmers University of Technology, Gothenburg (2002)
8.
go back to reference Smola, A.J.; Ovari, Z.L.; Williamson, R.C.: Regularization with dot-product kernels. In: Advances in Neural Information Processing Systems, pp. 308–314 (2001) Smola, A.J.; Ovari, Z.L.; Williamson, R.C.: Regularization with dot-product kernels. In: Advances in Neural Information Processing Systems, pp. 308–314 (2001)
13.
go back to reference Wang, K., Stolfo, S. J. (2003) One-class training for masquerade detection. In: Workshop on Data Mining for Computer Security, Melbourne, Florida Nov 19, pp. 10–19 Wang, K., Stolfo, S. J. (2003) One-class training for masquerade detection. In: Workshop on Data Mining for Computer Security, Melbourne, Florida Nov 19, pp. 10–19
15.
go back to reference Li, L., Gao, Z. P., & Ding, W. Y. (2010). Fuzzy multi-class support vector machine based on binary tree in network intrusion detection. In: 2010 International Conference on Electrical and Control Engineering, pp. 1043–1046. IEEE.IEEE. https://doi.org/10.1108/ics-04-2013-0031 Li, L., Gao, Z. P., & Ding, W. Y. (2010). Fuzzy multi-class support vector machine based on binary tree in network intrusion detection. In: 2010 International Conference on Electrical and Control Engineering, pp. 1043–1046. IEEE.IEEE. https://​doi.​org/​10.​1108/​ics-04-2013-0031
16.
go back to reference Cuong, T. D., & Giang, N. L. (2012). Intrusion detection under covariate shift using modified support vector machine and modified backpropagation. In: Proceedings of the Third Symposium on Information and Communication Technology, pp. 266–271. ACM. https://doi.org/10.1145/2350716.2350756 Cuong, T. D., & Giang, N. L. (2012). Intrusion detection under covariate shift using modified support vector machine and modified backpropagation. In: Proceedings of the Third Symposium on Information and Communication Technology, pp. 266–271. ACM. https://​doi.​org/​10.​1145/​2350716.​2350756
17.
go back to reference Parwekar, P.; Satapathy, S. C.: Leveraging Bigdata Towards Enabling Analytics Based Intrusion Detection Systems in Wireless Sensor Networks. CSI Communications, 12 (2012) Parwekar, P.; Satapathy, S. C.: Leveraging Bigdata Towards Enabling Analytics Based Intrusion Detection Systems in Wireless Sensor Networks. CSI Communications, 12 (2012)
19.
go back to reference Azad, C., & Jha, V. K. (2019). Decision tree and genetic algorithm based intrusion detection system. In: Proceeding of the Second International Conference on Microelectronics, Computing & Communication Systems (MCCS 2017), pp. 141–152. Springer, Singapore Azad, C., & Jha, V. K. (2019). Decision tree and genetic algorithm based intrusion detection system. In: Proceeding of the Second International Conference on Microelectronics, Computing & Communication Systems (MCCS 2017), pp. 141–152. Springer, Singapore
20.
go back to reference Tiwari, A.; Ojha, S. K.: Design and analysis of intrusion detection system via neural network, svm, and neuro-fuzzy. In: Abraham, A., Dutta, P., Mandal, J., Bhattacharya, A., Dutta, S. (eds) Emerging Technologies in Data Mining and Information Security, Advances in Intelligent Systems and Computing, vol. 755. pp. 49–63. Springer, Singapore (2019) Tiwari, A.; Ojha, S. K.: Design and analysis of intrusion detection system via neural network, svm, and neuro-fuzzy. In: Abraham, A., Dutta, P., Mandal, J., Bhattacharya, A., Dutta, S. (eds) Emerging Technologies in Data Mining and Information Security, Advances in Intelligent Systems and Computing, vol. 755. pp. 49–63. Springer, Singapore (2019)
21.
go back to reference Li, X.: Support vector machine based intrusion detection method combined with nonlinear dimensionality reduction algorithm. Sens. Transducers 159(11), 226 (2013) Li, X.: Support vector machine based intrusion detection method combined with nonlinear dimensionality reduction algorithm. Sens. Transducers 159(11), 226 (2013)
23.
go back to reference Parwekar, P., & Singhal, R. (2014). Robot assisted emergency intrusion detection and avoidance with a wireless sensor network. In: Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013, pp. 417–422. Springer, Cham. Parwekar, P., & Singhal, R. (2014). Robot assisted emergency intrusion detection and avoidance with a wireless sensor network. In: Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013, pp. 417–422. Springer, Cham.
28.
go back to reference Friedman, J. H. (1996). Another approach to polychotomous classification. Technical Report, Statistics Department, Stanford University. Friedman, J. H. (1996). Another approach to polychotomous classification. Technical Report, Statistics Department, Stanford University.
Metadata
Title
Analysis of Support Vector Machine-based Intrusion Detection Techniques
Authors
Bhoopesh Singh Bhati
C. S. Rai
Publication date
02-07-2019
Publisher
Springer Berlin Heidelberg
Published in
Arabian Journal for Science and Engineering / Issue 4/2020
Print ISSN: 2193-567X
Electronic ISSN: 2191-4281
DOI
https://doi.org/10.1007/s13369-019-03970-z

Other articles of this Issue 4/2020

Arabian Journal for Science and Engineering 4/2020 Go to the issue

Research Article - Special Issue - Intelligent Computing And Interdisciplinary Applications

An Adaptive Spiking Neural P System for Solving Vehicle Routing Problems

RESEARCH ARTICLE - SPECIAL ISSUE - INTELLIGENT COMPUTING and INTERDISCIPLINARY APPLICATIONS

An Efficient Filter-Based Feature Selection Model to Identify Significant Features from High-Dimensional Microarray Data

Research Article - Computer Engineering and Computer Science

LSB Pseudorandom Algorithm for Image Steganography Using Skew Tent Map

RESEARCH ARTICLE - SPECIAL ISSUE - INTELLIGENT COMPUTING and INTERDISCIPLINARY APPLICATIONS

Genetic-Inspired Map Matching Algorithm for Real-Time GPS Trajectories

RESEARCH ARTICLE - SPECIAL ISSUE - INTELLIGENT COMPUTING and INTERDISCIPLINARY APPLICATIONS

New Approaches in Metaheuristic to Classify Medical Data Using Artificial Neural Network

Premium Partners