Effective discriminant function for intrusion detection using SVM

Pinpointing the intrusion from the available huge intrusion data is demanding. Intrusion detection is treated as a data analysis problem. The process of finding accurate intrusion is typical in real world scenarios. For improving accurate identification of intrusions data mining approaches are adopted and proved automatic analysis with improved performance. These techniques enhancing the detection rate of the intrusions which is very effective. Discriminant function is very critical in separating the normal and anomaly behavior accurately. The support vector machine based classification algorithm is used to classify the intrusions accurately by using the discriminant function. The effective discriminant function will be accurately identifies the data into intrusion and anomaly. The evaluation of the discriminant is important in the evaluation of the intrusion detection system. Performance of intrusion detection system depends on the choice of the discriminant function.

[1]  Brett J. Borghetti,et al.  A Survey of Distance and Similarity Measures Used Within Network Intrusion Anomaly Detection , 2015, IEEE Communications Surveys & Tutorials.

[2]  Ali A. Ghorbani,et al.  Toward developing a systematic approach to generate benchmark datasets for intrusion detection , 2012, Comput. Secur..

[3]  Lang Yu,et al.  Intrusion detection using rough set classification , 2004, Journal of Zhejiang University. Science.

[4]  M. Aizerman,et al.  Theoretical Foundations of the Potential Function Method in Pattern Recognition Learning , 1964 .

[5]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[6]  Huan Liu,et al.  Feature Selection for Classification , 1997, Intell. Data Anal..

[7]  Salvatore J. Stolfo,et al.  A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).

[8]  P. Langley Selection of Relevant Features in Machine Learning , 1994 .

[9]  Xie Yong,et al.  An intelligent anomaly analysis for intrusion detection based on SVM , 2012, 2012 International Conference on Computer Science and Information Processing (CSIP).

[10]  Bertrand Portier Froment-Curtil Data Mining Techniques for Intrusion Detection , 2000 .

[11]  M. Tech,et al.  Data Mining Techniques for Intrusion Detection , 2015 .

[12]  Chuanhe Huang,et al.  Selection of Candidate Support Vectors in incremental SVM for network intrusion detection , 2014, Comput. Secur..

[13]  Vladimir Vapnik,et al.  Statistical learning theory , 1998 .

[14]  John A. Clark,et al.  Evolutionary computation techniques for intrusion detection in mobile ad hoc networks , 2011, Comput. Networks.

[15]  William L. Fithen,et al.  State of the Practice of Intrusion Detection Technologies , 2000 .

[16]  Carlos García Garino,et al.  Automatic network intrusion detection: Current techniques and open issues , 2012, Comput. Electr. Eng..

[17]  Christian Callegari,et al.  Advances in Computing, Communications and Informatics (ICACCI) , 2015 .

[18]  Jérôme Darmont,et al.  Scaling up Detection Rates and Reducing False Positives in Intrusion Detection using NBTree , 2010 .