A Hybrid RBF-SVM Ensemble Approach for Data Mining Applications

One of the major developments in machine learning in the past decade is the ensemble method, which finds highly accurate classifier by combining many moderately accurate component classifiers. This paper addresses using an ensemble of classification methods for data min ing applications like intrusion detection, direct market ing, and signature verificat ion. In this research work, new hybrid classification method is proposed for heterogeneous ensemble classifiers using arcing and their performances are analyzed in terms of accuracy. A Classifier ensemble is designed using a Radial Basis Function (RBF) and Support Vector Machine (SVM) as base classifiers. Here, modified train ing sets are formed by resampling from original training set; classifiers constructed using these training sets and then combined by voting. The proposed RBF-SVM hybrid system is superior to individual approach for intrusion detection, direct market ing, and signature verification in terms of classification accuracy.

[1]  Nissan Levin,et al.  Issues and problems in applying neural computing to target marketing , 1997 .

[2]  Adnan Amin,et al.  Hand-printed arabic character recognition system using an artificial network , 1996, Pattern Recognit..

[3]  Joao M. C. Sousa,et al.  Comparison of target selection methods in direct marketing , 2002 .

[4]  Tang Zaiyong Improving Direct Marketing Profitability with Neural Networks , 2011 .

[5]  Tang Ming . Wei Lian. Si Tuo Lin Si,et al.  Cryptography and Network Security - Principles and Practice , 2015 .

[6]  Ray Hunt,et al.  Intrusion detection techniques and approaches , 2002, Comput. Commun..

[7]  Majid Ahmadi,et al.  Recognition of handwritten numerals with multiple feature and multistage classifier , 1995, Pattern Recognit..

[8]  Leo Breiman,et al.  Bias, Variance , And Arcing Classifiers , 1996 .

[9]  Stan Matwin,et al.  Learning When Negative Examples Abound , 1997, ECML.

[10]  Arthur B. Maccabe,et al.  The architecture of a network level intrusion detection system , 1990 .

[11]  Maryam Daneshmandi mdaneshmandi A Hybrid Data Mining Model to Improve Customer Response Modeling in Direct Marketing , 2012 .

[12]  Guadalupe I. Janoski,et al.  Intrusion Detection : Support Vector Machines and Neural Networks , 2002 .

[13]  Erland Jonsson,et al.  Anomaly-based intrusion detection: privacy concerns and other problems , 2000, Comput. Networks.

[14]  Ching Y. Suen,et al.  Computer recognition of unconstrained handwritten numerals , 1992, Proc. IEEE.

[15]  Bernhard Schölkopf,et al.  Improving the Accuracy and Speed of Support Vector Machines , 1996, NIPS.

[16]  Aurobindo Sundaram,et al.  An introduction to intrusion detection , 1996, CROS.

[17]  M. Govindarajan Intrusion Detection using an Ensemble of Classification Methods , 2012 .

[18]  Yoav Freund,et al.  A decision-theoretic generalization of on-line learning and an application to boosting , 1995, EuroCOLT.

[19]  Ajith Abraham,et al.  Intrusion Detection Using Ensemble of Soft Computing Paradigms , 2003 .

[20]  Yoav Freund,et al.  Experiments with a New Boosting Algorithm , 1996, ICML.

[21]  Adam Krzyżak,et al.  Methods of combining multiple classifiers and their applications to handwriting recognition , 1992, IEEE Trans. Syst. Man Cybern..

[22]  Ching Y. Suen,et al.  Optimal combinations of pattern classifiers , 1995, Pattern Recognit. Lett..

[23]  Wolfgang Banzhaf,et al.  The use of computational intelligence in intrusion detection systems: A review , 2010, Appl. Soft Comput..

[24]  Sunil Gupta,et al.  Valuing customers , 2007 .

[25]  Wei-Yang Lin,et al.  Intrusion detection by machine learning: A review , 2009, Expert Syst. Appl..

[26]  Richard A. Kemmerer,et al.  State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..

[27]  Robert Tibshirani,et al.  The Elements of Statistical Learning: Data Mining, Inference, and Prediction, 2nd Edition , 2001, Springer Series in Statistics.

[28]  Sungzoon Cho,et al.  Constructing response model using ensemble based on feature subset selection , 2006, Expert Syst. Appl..

[29]  Ulrich H.-G. Kreßel,et al.  Pairwise classification and support vector machines , 1999 .

[30]  Taeshik Shon,et al.  A hybrid machine learning approach to network anomaly detection , 2007, Inf. Sci..

[31]  Magne Setnes,et al.  Fuzzy modeling of client preference from large data sets: an application to target selection in direct marketing , 2001, IEEE Trans. Fuzzy Syst..

[32]  Byung-Do Kim,et al.  Mailing smarter to catalog customers , 2000 .

[33]  Lucas M. Venter,et al.  A comparison of Intrusion Detection systems , 2001, Comput. Secur..

[34]  C. Bauer A direct mail customer purchase model , 1988 .

[35]  Sugata Sanyal,et al.  Adaptive neuro-fuzzy intrusion detection systems , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[36]  Christophe Croux,et al.  Bagging and Boosting Classification Trees to Predict Churn , 2006 .

[37]  Qi Tian,et al.  Feature selection using principal feature analysis , 2007, ACM Multimedia.

[38]  Jiawei Han,et al.  Data Mining: Concepts and Techniques , 2000 .

[39]  Andrew H. Sung,et al.  Intrusion Detection Systems Using Adaptive Regression Splines , 2004, ICEIS.

[40]  Sungzoon Cho,et al.  Response modeling with support vector machines , 2006, Expert Syst. Appl..

[41]  Anup K. Ghosh,et al.  A Study in Using Neural Networks for Anomaly and Misuse Detection , 1999, USENIX Security Symposium.

[42]  Rita C. Summers Secure Computing: Threats and Safeguards , 1996 .

[43]  David J. Marchette A Statistical Method for Profiling Network Traffic , 1999, Workshop on Intrusion Detection and Network Monitoring.

[44]  Bernhard Sick,et al.  Evolutionary optimization of radial basis function classifiers for data mining applications , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).