ENSEMBLE OF SUPPORT VECTOR MACHINES USING FUZZY-PAM FOR INTRUSION DETECTION

Authors:

G Kishor Kumar,R Raja Kumar,K.Nageswara Reddy,P.Arun Babu,

DOI NO:

https://doi.org/10.26782/jmcms.spl.5/2020.01.00009

Keywords:

Classification,svm,ensemble techniques,intrusion detection,correlation coefficient,

Abstract

In this paper, we introduce, “an ensemble of Support Vector Machines (SVM) using Fuzzy-PAM” for network-based intrusion detection. First, the given set of features in a data set is partitioned into blocks or clusters based on correlation coefficient values between pairs of features or attributes. Then the data set is projected onto these feature set to obtain various data sets. SVM is applied on each data set. The given query pattern is also projected onto the feature set and the decision of each SVM is obtained. Weightage is given to each cluster, which is combined with decision of each SVM to obtain a final decision for classifying the given query. We shown the results of applying an ensemble of Support Vector Machines to 1999 KDD Cup data set.

Refference:

I. A. K. Jain, R. C. Dubes, “Algorithms for Clustering Data”, Prentice Hall,
Engle-wood Clis NJ, U.S.A., 1988.
II. A. W. H. Debar, M. Dacier, “Towards a taxonomy of intrusion-detection
systems”, Computer Networks, Vol.: 31, pp.805–822, 1999.
III. C.C. Chang, C.J. L. Libsvm, “A library for support vector machines”,
Software available at http://www.csie.ntu.edu.tw/ cjlin/libsvm, 2001.
IV. C. Cortes, V. Vapnik, “Support-vector network”, Machine Learning, Vol.: 20,
pp. 273–297, 1995.
V. C. J. C. Burges, “A tutorial on support vector machines for pattern
recognition”, Data Mining and Knowledge Discovery, Vol.: 2, Issue: 1, pp.
47, 1998.
VI. G. B. E. Boser, V. Vapnik, “A training algorithm for optimal margin classifiers”,
Proceedings of the Fifth Annual Workshop on Computational
Learning Theory, ACM Press, pp. 144–152, 1992.

VII. I. Graf, R. P. Lippman, D. J. Fried, M. A. Zissman, “Evaluating intrusion
detection systems: The 1998 darpa online intrusion detection evaluation”, In
Proceedings of DARPA Information Survivability Conf. and Exosition
(DISCEX’00), pp. 12–26, 2000.
VIII. J. Han, M. Kamber, “Data Mining: Concepts and Techniques”, Aca-demic
Press, 2001.
IX. Lincoln Laboratory MIT. DARPA Intrusion Detection Data Sets.
http://www.ll.mit.edu/mission/communications/ist/corpora/ideval/data/index.h
tml.
X. L. Kaufman, P. Rousseeuw, “Finding groups in data: An introduction to
cluster analysis”, John Wiley & Sons, New York, 1990.
XI. P. Cunningham, “Ensemble techniques”, Technical Report UCD-CSI-2007-5,
2007.
XII. R. O. Duda, P. E. Hart, D. G. Stork, “Pattern Classification”, A Wileyinterscience
Publication, John Wiley & Sons, 2nd edition, 2000.
XIII. S. Bhatnagar, P. Viswanath, M. Murty, “Partition based pattern synthesis
technique with ecient algorithms for nearest neighbor classification”, Pattern
Recognition Letters, Vol.: 27, pp.1714–1724, 2006.
XIV. S. J. Stolfo, W. Lee, “A data mining framework for building intrusion
detection mod-els”, Proceedings of the IEEE Symposium on Security and
Privacy, 1999.
XV. V. N. Vapnik, “An overview of statistical learning theory”, IEEE Transactions
on Neural Networks, Vol.: 10, Issue: 5, 1999.
XVI. W. L. M. Tavallaee, E. Bagheri, A. A. Ghorbani, “A deatiled analysis of the
kdd cup 99 data set”, In Proceedings of IEEE Symposium on Computer
Intelligence in Security and Defense Applications(CISDA), 2009.
XVII. Y. Freund, R. E. Schapire, “Experiments with a new boosting algorithm”, In
Proceedings 13th International Conference on Machine Learning, San
Francisco, pp. 148–146, 1996.

View | Download