Skip to main content

2021 | OriginalPaper | Buchkapitel

Network Intrusion Detection Model Using One-Class Support Vector Machine

verfasst von : Ahmed M. Mahfouz, Abdullah Abuhussein, Deepak Venugopal, Sajjan G. Shiva

Erschienen in: Advances in Machine Learning and Computational Intelligence

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Network intrusion detection is the process of monitoring network traffic for abnormal behaviors and issuing alerts when such suspicious activity is discovered. This paper presents a new network intrusion detection approach that trains on normal network traffic data and searches for anomalous behaviors that deviate from the normal model. The proposed approach applies one-class support vector machine (OCSVM) algorithm to detect anomalous activities in the network traffic. The experiment was done using a dataset of real network traffic collected using the modern honey network (MHN).

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Mohamed Abomhara, Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. J. Cyber. Secur. Mobility. 4(1), 65–88 (2015)CrossRef Mohamed Abomhara, Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. J. Cyber. Secur. Mobility. 4(1), 65–88 (2015)CrossRef
2.
Zurück zum Zitat R. Singh et al., Internet attacks and intrusion detection system: a review of the literature. Online. Inf. Rev. 41(2), 171–184 (2017)CrossRef R. Singh et al., Internet attacks and intrusion detection system: a review of the literature. Online. Inf. Rev. 41(2), 171–184 (2017)CrossRef
3.
Zurück zum Zitat S. Zanero, S.M. Savaresi, Unsupervised learning techniques for an intrusion detection system. in Proceedings of the 2004 ACM Symposium on Applied Computing (ACM, 2004) S. Zanero, S.M. Savaresi, Unsupervised learning techniques for an intrusion detection system. in Proceedings of the 2004 ACM Symposium on Applied Computing (ACM, 2004)
4.
Zurück zum Zitat B. Schölkopf et al., Estimating the support of a high-dimensional distribution. Neural. comput. 13(7), 1443–1471 (2001)MathSciNetCrossRef B. Schölkopf et al., Estimating the support of a high-dimensional distribution. Neural. comput. 13(7), 1443–1471 (2001)MathSciNetCrossRef
5.
Zurück zum Zitat K. Yamanishi et al., On-line unsupervised outlier detection using finite mixtures with discounting learning algorithms. Data Min. Knowl. Disc. 8(3), 275–300 (2004)MathSciNetCrossRef K. Yamanishi et al., On-line unsupervised outlier detection using finite mixtures with discounting learning algorithms. Data Min. Knowl. Disc. 8(3), 275–300 (2004)MathSciNetCrossRef
6.
Zurück zum Zitat K. Yamanishi, J. Takeuchi Discovering outlier filtering rules from unlabeled data: combining a supervised learner with an unsupervised learner. in Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (ACM, 2001) K. Yamanishi, J. Takeuchi Discovering outlier filtering rules from unlabeled data: combining a supervised learner with an unsupervised learner. in Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (ACM, 2001)
7.
Zurück zum Zitat L.M. Manevitz, Y. Malik, OCSVMs for document classification. J. Mach. Learn. Res. 2, 139–154 (2001)MATH L.M. Manevitz, Y. Malik, OCSVMs for document classification. J. Mach. Learn. Res. 2, 139–154 (2001)MATH
8.
Zurück zum Zitat D. Tax, One-class classification; Concept-learning in the absence of counterexamples. Ph. D. thesis. Delft University of Technology, ASCI Dissertation Series. p. 146 (2001) D. Tax, One-class classification; Concept-learning in the absence of counterexamples. Ph. D. thesis. Delft University of Technology, ASCI Dissertation Series. p. 146 (2001)
9.
Zurück zum Zitat C.J.C. Burger, A tutorial on support vector machines for pattern recognition, data mining and knowledge discovery. Workshop on data mining and knowledge discovery (1998) C.J.C. Burger, A tutorial on support vector machines for pattern recognition, data mining and knowledge discovery. Workshop on data mining and knowledge discovery (1998)
10.
Zurück zum Zitat JC Platt et al, Estimating the support of a high-dimensional distribution. Technical Report MSR-T R-99–87, Microsoft Research (MSR) (1999) JC Platt et al, Estimating the support of a high-dimensional distribution. Technical Report MSR-T R-99–87, Microsoft Research (MSR) (1999)
11.
Zurück zum Zitat R. Koch, G. Mario, G.D. Rodosek, Towards comparability of intrusion detection systems: new data sets. in: TERENA Networking Conference, vol. 7 (2014) R. Koch, G. Mario, G.D. Rodosek, Towards comparability of intrusion detection systems: new data sets. in: TERENA Networking Conference, vol. 7 (2014)
13.
Zurück zum Zitat Varun Chandola, Arindam Banerjee, Vipin Kumar, Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41(3), 15 (2009)CrossRef Varun Chandola, Arindam Banerjee, Vipin Kumar, Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41(3), 15 (2009)CrossRef
14.
Zurück zum Zitat H.J. Liao et al., Intrusion detection system: a comprehensive review. J. Netw. Comput. Appl. 36(1), 16–24 (2013)CrossRef H.J. Liao et al., Intrusion detection system: a comprehensive review. J. Netw. Comput. Appl. 36(1), 16–24 (2013)CrossRef
15.
Zurück zum Zitat G. Giacinto, Intrusion detection in computer networks by a modular ensemble of one-class classifiers. Inf. Fusion 9(1), 69–82 (2008)CrossRef G. Giacinto, Intrusion detection in computer networks by a modular ensemble of one-class classifiers. Inf. Fusion 9(1), 69–82 (2008)CrossRef
16.
Zurück zum Zitat Inho Kang, Myong K. Jeong, Dongjoon Kong, A differentiated one-class classification method with applications to intrusion detection. Expert Syst. Appl. 39(4), 3899–3905 (2012)CrossRef Inho Kang, Myong K. Jeong, Dongjoon Kong, A differentiated one-class classification method with applications to intrusion detection. Expert Syst. Appl. 39(4), 3899–3905 (2012)CrossRef
17.
Zurück zum Zitat P. Nader, P. Honeine, P. Beauseroy, Intrusion detection in SCADA systems using one-class classification. in 21st European Signal Processing Conference (EUSIPCO 2013) (IEEE, 2013) P. Nader, P. Honeine, P. Beauseroy, Intrusion detection in SCADA systems using one-class classification. in 21st European Signal Processing Conference (EUSIPCO 2013) (IEEE, 2013)
18.
Zurück zum Zitat O. U. S. S. A. M. A. Ghorbel, H. I. C. H. E. M. Snoussi, M. O. H. A. M. E. D. Abid, Online OCSVM for outlier detection based on the Coherence Criterion in Wireless Sensor Networks. in Proc International Conference. vol. 12 (2013) O. U. S. S. A. M. A. Ghorbel, H. I. C. H. E. M. Snoussi, M. O. H. A. M. E. D. Abid, Online OCSVM for outlier detection based on the Coherence Criterion in Wireless Sensor Networks. in Proc International Conference. vol. 12 (2013)
19.
Zurück zum Zitat S. Kaplantzis et al, Detecting selective forwarding attacks in wireless sensor networks using support vector machines. in 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information (IEEE, 2007) S. Kaplantzis et al, Detecting selective forwarding attacks in wireless sensor networks using support vector machines. in 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information (IEEE, 2007)
20.
Zurück zum Zitat Y. Xiao et al., Two methods of selecting Gaussian kernel parameters for OCSVM and their application to fault detection. Knowl.-Based Syst. 59, 75–84 (2014)CrossRef Y. Xiao et al., Two methods of selecting Gaussian kernel parameters for OCSVM and their application to fault detection. Knowl.-Based Syst. 59, 75–84 (2014)CrossRef
21.
Zurück zum Zitat M. Amer, M. Goldstein, S. Abdennadher, Enhancing one-class support vector machines for unsupervised anomaly detection. in Proceedings of the ACM SIGKDD Workshop on Outlier Detection and Description (ACM, 2013) M. Amer, M. Goldstein, S. Abdennadher, Enhancing one-class support vector machines for unsupervised anomaly detection. in Proceedings of the ACM SIGKDD Workshop on Outlier Detection and Description (ACM, 2013)
22.
Zurück zum Zitat Gisung Kim, Seungmin Lee, Sehun Kim, A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Syst. Appl. 41(4), 1690–1700 (2014)MathSciNetCrossRef Gisung Kim, Seungmin Lee, Sehun Kim, A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Syst. Appl. 41(4), 1690–1700 (2014)MathSciNetCrossRef
23.
Zurück zum Zitat P. Winter, E. Hermann, M. Zeilinger, Inductive intrusion detection in flow-based network data using one-class support vector machines. in 2011 4th IFIP international conference on new technologies, mobility and security (IEEE, 2011) P. Winter, E. Hermann, M. Zeilinger, Inductive intrusion detection in flow-based network data using one-class support vector machines. in 2011 4th IFIP international conference on new technologies, mobility and security (IEEE, 2011)
Metadaten
Titel
Network Intrusion Detection Model Using One-Class Support Vector Machine
verfasst von
Ahmed M. Mahfouz
Abdullah Abuhussein
Deepak Venugopal
Sajjan G. Shiva
Copyright-Jahr
2021
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-5243-4_7

    Marktübersichten

    Die im Laufe eines Jahres in der „adhäsion“ veröffentlichten Marktübersichten helfen Anwendern verschiedenster Branchen, sich einen gezielten Überblick über Lieferantenangebote zu verschaffen.