A Review of Support Vector Machine-based Intrusion Detection System for Wireless Sensor Network with Different Kernel Functions

Wireless sensor network (WSN) is among the popular communication technology which capable of self-configured and infrastructure-less wireless networks to monitor physical or environmental conditions. WSN also is the most standard services employed in commercial and industrial applications, because of its technical development in a processor, communication, and low-power usage of embedded computing devices. However, WSN is vulnerable due to the dynamic nature of wireless network. One of the best solutions to mitigate the risk is implementing Intrusion Detection System (IDS) to the network. Numerous researches were done to improve the efficiency of WSN-IDS because attacks in networks has been evolved due to the rapid growth of technology. Support Vector Machine (SVM) is one of the best algorithms for the enhancement of WSN-IDS. Nevertheless, the efficiency of classification in SVM is based on the kernel function used. Since dynamic environment of WSN consist of nonlinear data, linear classification of SVM has limitations in maximizing its margin during the classification. It is important to have the best kernel in classifying nonlinear data as the main goal of SVM to maximize the margin in the feature space during classification. In this research, kernel function of SVM such as Linear, RBF, Polynomial and Sigmoid were used separately in data classification. In addition, a modified version of KDD’99, NSL-KDD was used for the experiment of this research. Performance evaluation was made based on the experimental result obtained. Finally, this research found out that RBF kernel provides the best classification result with 91% accuracy.

[1]  Aman Jantan,et al.  Hybridizing artificial bee colony with monarch butterfly optimization for numerical optimization problems , 2018, Neural Computing and Applications.

[2]  V. Vapnik The Support Vector Method of Function Estimation , 1998 .

[3]  C. Douligeris,et al.  Detecting denial of service attacks using emergent self-organizing maps , 2005, Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005..

[4]  Mayank Arya Chandra,et al.  Survey on SVM and their application in image classification , 2018 .

[5]  M. K. Kavitha Devi,et al.  A Smart Approach for Intrusion Detection and Prevention System in Mobile Ad Hoc Networks Against Security Attacks , 2020, Wireless Personal Communications.

[6]  Ashwini B. Abhale,et al.  Supervised Machine Learning Classification Algorithmic Approach for Finding Anomaly Type of Intrusion Detection in Wireless Sensor Network , 2020, Optical Memory and Neural Networks.

[7]  Kalyani C. Waghmare,et al.  Intrusion Detection System Using Data Mining Technique : Support Vector Machine , 2013 .

[8]  Sanjay Sharma,et al.  Intrusion Detection System: A Review , 2015 .

[9]  M. A. Jabbar,et al.  Random Forest Modeling for Network Intrusion Detection System , 2016 .

[10]  Chun-Hung Richard Lin,et al.  Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..

[11]  Zain Anwar Ali,et al.  Role of Machine Learning and Data Mining in Internet Security: Standing State with Future Directions , 2018, J. Comput. Networks Commun..

[12]  Rakhi D. Wajgi,et al.  Classification of Attacks Using Support Vector Machine (SVM) on KDDCUP'99 IDS Database , 2015, 2015 Fifth International Conference on Communication Systems and Network Technologies.

[13]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[14]  Risanuri Hidayat,et al.  Performance comparison of intrusion detection system based anomaly detection using artificial neural network and support vector machine , 2016 .

[15]  Monika Drewnik,et al.  SVM Kernel Configuration and Optimization for the Handwritten Digit Recognition , 2017, CISIM.

[16]  E. Baraneetharan,et al.  Role of Machine Learning Algorithms Intrusion Detection in WSNs: A Survey , 2020, September 2020.

[17]  Djallel Eddine Boubiche,et al.  Cybersecurity Issues in Wireless Sensor Networks: Current Challenges and Solutions , 2020, Wireless Personal Communications.

[18]  Mahesh Panchal,et al.  A Review on Support Vector Machine for Data Classification , 2012 .

[19]  Gulshan Kumar,et al.  The use of artificial intelligence based techniques for intrusion detection: a review , 2010, Artificial Intelligence Review.

[20]  Eyas El-Qawasmeh,et al.  Informatics Engineering and Information Science , 2011 .

[21]  Sheldon X.-D. Tan,et al.  SVM Based Intrusion Detection Using Nonlinear Scaling Scheme , 2018, 2018 14th IEEE International Conference on Solid-State and Integrated Circuit Technology (ICSICT).

[22]  Iftikhar Ahmad,et al.  A Review of Classification Approaches Using Support Vector Machine in Intrusion Detection , 2011 .

[23]  Shafiullah Khan,et al.  Intrusion Detection Systems in Wireless Sensor Networks: A Review , 2013, Int. J. Distributed Sens. Networks.

[24]  Sergio M. Savaresi,et al.  Unsupervised learning techniques for an intrusion detection system , 2004, SAC '04.

[25]  Manas Ranjan Patra,et al.  A Hybrid Intelligent Approach for Network Intrusion Detection , 2012 .

[26]  Ravi Sankar,et al.  A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.

[27]  K. V. N. Sunitha,et al.  Anomaly Detection using Feature Selection and SVM Kernel Trick , 2015 .

[28]  Xiaomin Zhao,et al.  An Analytical Approach to Fast Parameter Selection of Gaussian RBF Kernel for Support Vector Machine , 2015, J. Inf. Sci. Eng..

[29]  Muhammad Achirul Nanda,et al.  A Comparison Study of Kernel Functions in the Support Vector Machine and Its Application for Termite Detection , 2018, Inf..

[30]  Zhong Jin,et al.  A novel SVM by combining kernel principal component analysis and improved chaotic particle swarm optimization for intrusion detection , 2014, Soft Computing.

[31]  Hossein Jadidoleslamy,et al.  A HIERARCHICAL INTRUSION DETECTION ARCHITECTURE FOR WIRELESS SENSOR NETWORKS , 2011 .

[32]  K. V. N. Sunitha,et al.  Effective discriminant function for intrusion detection using SVM , 2016, 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[33]  Farid García,et al.  A comprehensive survey on support vector machine classification: Applications, challenges and trends , 2020, Neurocomputing.

[34]  Md. Al Mehedi Hasan,et al.  Feature Selection for Intrusion Detection Using Random Forest , 2016 .

[35]  Balachandra Muniyal,et al.  Performance Evaluation of Supervised Machine Learning Algorithms for Intrusion Detection , 2016 .

[36]  Chee Khiang Pang,et al.  Classification of Imbalanced Data by Oversampling in Kernel Space of Support Vector Machines , 2018, IEEE Transactions on Neural Networks and Learning Systems.

[37]  Dishan Jing,et al.  SVM Based Network Intrusion Detection for the UNSW-NB15 Dataset , 2019, 2019 IEEE 13th International Conference on ASIC (ASICON).

[38]  Jinoh Kim,et al.  A survey of deep learning-based network anomaly detection , 2017, Cluster Computing.

[39]  Zuherman Rustam,et al.  Comparison between Support Vector Machine and Fuzzy C-Means as Classifier for Intrusion Detection System , 2018, Journal of Physics: Conference Series.

[40]  Jugal K. Kalita,et al.  Towards an Unsupervised Method for Network Anomaly Detection in Large Datasets , 2014, Comput. Informatics.

[41]  Chunyu Wang,et al.  RFAmyloid: A Web Server for Predicting Amyloid Proteins , 2018, International journal of molecular sciences.

[42]  Dong Seong Kim,et al.  Intrusion detection system , 2020, International Journal of Engineering and Techniques.