Mehmood, T. and Rais, H.B.M. (2016) SVM for network anomaly detection using ACO feature subset. In: UNSPECIFIED.
Full text not available from this repository.Abstract
Over the past short time, network security facing a lot of challenges. Confidentiality, integrity, and availability are the major concerns of the data. To cope with this problem different systems have been developed and the systems are known as Intrusion detection systems. Intrusion detection system detects the violation of confidentiality, integrity, and availability of the data. Intrusion detection systems are developed on the bases of two different detection techniques, signature-based technique and anomaly-based technique. Classification approach has been widely adopted for the development of the anomaly detection model to classify the data into normal class and attack class. But irrelevant and redundant features are the obstacle for classification algorithm to build an efficient detection model. This paper proposes a detection model, ant system with support vector machine, which uses ant system, a variation of ant colony optimization, to filter out the redundant and irrelevant features for support vector machine classification algorithm. KDD99, which is a benchmark dataset used for anomaly detection, has been adopted here. Each instance in KDD99 has been represented by 41 features which also has some redundant or irrelevant features. Ant system has been used to remove those redundant and irrelevant features. The selected feature subset using ant system is then validated using support vector machine. The experimental results showed that the performance of the classification algorithm, when trained with the reduced feature set, has been improved. The performance measures used in this comparison are true positive rate, false positive rate, and precision. © 2015 IEEE.
Item Type: | Conference or Workshop Item (UNSPECIFIED) |
---|---|
Impact Factor: | cited By 18 |
Uncontrolled Keywords: | Ant colony optimization; Artificial intelligence; Classification (of information); Computer crime; Feature extraction; Learning systems; Mercury (metal); Network security; Optimization; Signal detection; Support vector machines; Vectors, Anomaly detection; Anomaly detection models; Classification algorithm; Classification approach; Intrusion Detection Systems; Network anomaly detection; Network based intrusion detection systems; Support vector machine classification, Intrusion detection |
Depositing User: | Ms Sharifah Fahimah Saiyed Yeop |
Date Deposited: | 25 Mar 2022 07:43 |
Last Modified: | 25 Mar 2022 07:43 |
URI: | http://scholars.utp.edu.my/id/eprint/30918 |