Intrusion Detection using An Ensemble of Support Vector Machines

Authors:

G Kishor Kumar,R Raja Kumar,M Suleman Basha,K Nageswara Reddy,

DOI NO:

https://doi.org/10.26782/jmcms.spl.3/2019.09.00020

Keywords:

Bootstrapping,classification,svm,ensemble techniques,intrusion detection,

Abstract

This paper “an ensemble of Support Vector Machines (SVM)” for networkbased intrusion detection. Bootstrapping is applied to derive various training sets from the given training set. Then a SVM is derived for each training set. The decisions of all SVMs is taken and majority voting is considered to classify the given query pattern as a normal or an anomalous one. We have shown the results of applying an ensemble of Support Vector Machines to the two standard data sets,viz.,1999KDDCupandCreditcarddatasets.

Refference:

I. A.K.Jain, B.Yu, “An automatic text location in images and video
frames”, Pattern Recognition, Vol.: 31, Issue: 12, pp. 2055–2976, 1998.
II. A.W.H.Debar, M.Dacier, “Towards a taxonomy of intrusion- detection
systems”, Computer Networks, Vol.: 31, pp. 805–822, 1999.

III. B.H.Drucker, D.C.Gibbon, “Support vector machines:relevance feedback
and information retrieval”, Information Processing Management, Vol.:
38, Issue: 3, pp. 305–323, 2002.
IV. C.Burges, “A tutorial on support vector machines for pattern
recognition”, Data Mining and Knowledge Discovery, Vol.: 2, pp. 1–47,
1998.
V. C.Chang, C.Lin, “Libsvm: a library for support vector machines”,
Software available at http://www.csie.ntu.edu.tw/ cjlin/libsvm, 2001.
VI. D.Mckay, C.Fyfe, “Probability prediction using support vector
machines”, Proceedings of Int Conferecne on Knowledge-Based
Intelligent Engineering Systems and Allied Technologies, Vol.: 1, pp.
189–192, 2000.
VII. E.Hjelams, B.K.Low, “Face detection : A survey. Computer Vision and
Image Understading”, Vol.:83, pp. 236–274, 2001.
VIII. F.Seraldi, J.Bigun, “Retinal vision applied to facial features detection and
face authentication”, Pattern Recognition Letters, Vol.: 23, pp. 463– 475,
2002.
IX. F.Y.S.R.E, “Experiments with a new boosting algorithm”, Proceedings
13th International Conference on Machine Learning. San Francisco:
Morgan Kaufmann, pp. 148–146, 1996.
X. G.K.Kumar, P.Viswanath, A.A.Rao, “Ensemble of Soft Decision Trees
for Robust Classification”, Sadhana- Indian Academy of Sciences, Vol.:
41, Issue: 3, pp. 273-282, 2016.
XI. G.K.Kumar, P.Viswanath, A.A.Rao, “Ensemble of Soft Decision Trees
Using Multiple Approximate Fuzzy-Rough Set Based Reducts”,
International Journal of Information Processing, Vol: 9, Issue: 2, 36-46,
2015.
XII. G.K.Kumar, P.Viswanath, A.A.Rao, “Intrusion Detection Using an
Ensemble of Decision Trees”, In the proceedings of fifth Indian
International Conference on Artificial Intelligence (IICAI), pp 382-392,
2011.
XIII. H.Byun, S.-W.Lee, “Application of support vector machines for pattern
recognition: A survey”, Lecturer Notes in Computer Science, Vol.: 2388,
pp. 571–591, 2002.

XIV. I.B.E.Boser, V.Vapnik, “A training algorithm for optimal margin
classifiers”, Proceedings of the Fifth Annual Workshop on
Computational Learning Theory. ACM Press, pp. 144–152,1992.
XV. I.R.P.Lippman, D.J.Fried, M.A.Zissman, “Evaluating intrusion detection
systems: The 1998 darpa off-line intrusion detection evaluation”,
Proceedings of DARPA Information Survivability Conf. and
Exosition(DISCEX’00), pp. 12–26, 2000.
XVI. J.D.Gao, L.Xin, “Svm-based detection of moving vehicles for automatic
traffic monitoring”, IEEE Intelligent Transportation System, pp. 745–
749, 2001.
XVII. J.Han, M.Kamber, “Data Mining: Concepts and Techniques”, Academic
Press, 2001.
XVIII. J.K.Jonsson, Y.P.Matas, “Support vector machines for face
authentication”, Image and Vision Computing, Vol.: 20, pp. 369–375,
2002.
XIX. J.R.Quinlan, “C4.5 Programs for Machine Learning”, Morgan
Kaufmann,los Atlos,1993.
XX. J.R.Quinlan, “Simplifying decision trees”, International Journal of Man
Machine Studies, Vol.: 27, no. 3, pp. 221–234,1987.
XXI. L.L.MIT, DARPA Intrusion Detection Data Sets,
http://www.ll.mit.edu/mission/communications/ist/corpora/ideval/data/in
dex.html
XXII. M.C.Ma, J.Drish, “A support vector machines-based rejection technique
for speech recognition”, Proceedings of IEEE Int Conferecne on
Acoustics, Speech and Signal Processing, Vol.: 1, pp. 381–384, 2001.
XXIII. M.Pontil, A.Verri, “Support vector machines for 3-d object recognition”,
IEEE Transportations on Pattern Analysis and Machine Intelligence, pp.
637–646, 1998.
XXIV. P.Cunningham, “Ensemble techniques”, Technical Report UCDCSI2007-
5, 2007.
XXV. P.Q.Tian, T.S.Huang, “Update relevant image weights for content based
image retrieval using support vector machines”, Proceedings of IEEE Int
Conferecne on Multimedia and Expo, Vol.: 2, pp. 1199– 1202, 2000.

XXVI. R.E.Osuna, F.Girosi, “Training support machines: An application to face
detection”, Proceedings of IEEE Conferece on Computer Vision and
Pattern Recongition, pp. 130–136, 1997.
XXVII. R.O.Duda, P.E.Hart, D.G.Stork, “Pattern Classification”, 2nd ed. John
Wiley & Sons: A Wiley-interscience Publication, 2002.
XXVIII. S.G.Guo, K.L.Chan, “Support vector machines for face recognition”,
Journal of Image and Vision Computing, Vol.: 19, pp. 631–638, 2001.
XXIX. S.W.Lee, “A data mining framework for building intrusion detection
models”, Proceedings of the IEEE Symposium on Security and Privacy,
1999.
XXX. T.Joachims, “Text categorization with support vector machines: learning
with many relevant features”, Proceedings of 10th European Conferece
on Machine Learning, 1999.
XXXI. V.N.Vapnik, “An overview of statistical learning theory”, IEEE
Transactions on Neural Networks, Vol.: 10, Issue: 5, 1999.
XXXII. V Vapnik, “Statistical Learning Theory”, New York Wiley, 1998.
XXXIII. V.Vapnik, “The Nature of Statistical Learning Theory”, New York:
Springer-Verlag, 1995.
XXXIV. V.Wan, W.M.Campbell, “Support vector machines for speaker
verification and identification”, Proceedings of IEEE Workshop on
Neural Networks for Signal Processing, Vol.: 2, 2000.
XXXV. W.L.M.Tavallaee, Ebrahim Bagheri and A. A. Ghorbani, “A deatiled
analysis of the kdd cup 99 data set”, IEEE Symposium on Computer
Intelligence in Security and Defense Applications(CISDA), 2009.
XXXVI. Y.B.Zhao, S.W.Xia, “Support vector machines and its application in
handwritten numeircal recognition”, Proceedings of 15th International
Conferece on Pattern Recongition, Vol.: 2, pp. 720–723, 2000.

View | Download