Application of the support vector machine in network intrusion detection

2427 mots 10 pages
Application of the Support Vector Machine in Network Intrusion Detection
Ye Shu
School of Telecommunication Engineering, Beijing University of Posts &
Telecommunications, Beijing, 100876 allannays@gmail.com Abstract: In network security, an intrusion attempt is defined as the potential possibility of a deliberate unauthorized attempt to access information, manipulate information, or render a system unusable. During the past decades, approaches for intrusion detections have been studied and improved. In this paper, Support Vector Machine (SVM) is adopted as a tool in anomaly intrusion detection. We use KDD Cup '99 dataset to build training data sets and testing data sets. The result of the experiments shows that SVM has a good ability in binary classification, multi-classification and generalization.
Key words: network security, intrusion detection, support vector machine, Libsvm, KDD Cup '99, classification
1. Introduction
With the rapid development of computer network and information technology, network security has become the focus attention of the public. Intrusion detection is considered one of the indispensable technologies in information security. We are facing a problem of how to quickly and effectively detect the intrusions already known as well as the newly emerging ones. Conventional methods of intrusion detection bear the disadvantages of being inefficient and inaccurate. For guaranteeing the ideal classification accuracy, the detecting system has to depend on massive amounts of training data which inevitably makes it very time consuming. However, the detection system must respond in real time and react quickly to those intrusions unknown. Support Vector Machine (SVM) is a learning method, building on statistic theory and Structural Risk Minimization Principle, used for classification and regression. The application of SVM in intrusion detection is able to achieve a better accuracy rate with much fewer training data samples.
2. Intrusion

en relation

  • Note d'information SURBAT
    423 mots | 2 pages
  • Etude de cas sobibo
    663 mots | 3 pages
  • CV Yohan LEBON Origine
    340 mots | 2 pages
  • Systeme d'information de la sncf
    2213 mots | 9 pages
  • Enquête des métiers en tension
    597 mots | 3 pages
  • Shell et shell
    1833 mots | 8 pages
  • Hgfrtyukilomplo
    1325 mots | 6 pages
  • APP idento vigilance
    1081 mots | 5 pages
  • Activité BAC professionnel SEN
    528 mots | 3 pages
  • app aide soignant
    1052 mots | 5 pages
  • App surveillance post-interventionnelle
    957 mots | 4 pages
  • Sans Nom 1
    992 mots | 4 pages
  • Conclusion personnelle tpe
    332 mots | 2 pages
  • Aiguille de pac
    3541 mots | 15 pages
  • Dossier de sponsoring rotaract agadir founty
    2704 mots | 11 pages