CFP last date
20 January 2025
Reseach Article

Anomaly Detection using Feature Selection and SVM Kernel Trick

by R. Ravinder Reddy, Y. Ramadevi, K.V.N Sunitha
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 129 - Number 4
Year of Publication: 2015
Authors: R. Ravinder Reddy, Y. Ramadevi, K.V.N Sunitha
10.5120/ijca2015906823

R. Ravinder Reddy, Y. Ramadevi, K.V.N Sunitha . Anomaly Detection using Feature Selection and SVM Kernel Trick. International Journal of Computer Applications. 129, 4 ( November 2015), 31-35. DOI=10.5120/ijca2015906823

@article{ 10.5120/ijca2015906823,
author = { R. Ravinder Reddy, Y. Ramadevi, K.V.N Sunitha },
title = { Anomaly Detection using Feature Selection and SVM Kernel Trick },
journal = { International Journal of Computer Applications },
issue_date = { November 2015 },
volume = { 129 },
number = { 4 },
month = { November },
year = { 2015 },
issn = { 0975-8887 },
pages = { 31-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume129/number4/23063-2015906823/ },
doi = { 10.5120/ijca2015906823 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:22:32.790232+05:30
%A R. Ravinder Reddy
%A Y. Ramadevi
%A K.V.N Sunitha
%T Anomaly Detection using Feature Selection and SVM Kernel Trick
%J International Journal of Computer Applications
%@ 0975-8887
%V 129
%N 4
%P 31-35
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Analysis of system security becomes a major task for researchers. Intrusion detection plays a vital role in the security domain in these days, Internet usage has been increased enormously and with this, the threat to system resources has also increased. Anomaly based intrusion changes its behaviour dynamically, to detect these types of intrusions need to adopt the novel approaches are required. Detection of intrusion is very important at the same time both accuracy and speed are imperative factors in the real environment. Analyzing intrusive behaviour of the network data is crucial because it contains huge amounts of data as well as the dimensions of the data are also a problem to researchers in detecting intrusive behaviour. In this paper rough set theory is used for the dimensional reduction and the feature selection. Once feature selection is done, Support Vector Machines (SVM) is used to classify the reduct data by using kernel trick. SVM works based on the structural risk minimization principle. It classifying the data in the faster manner with more accuracy to detect the intruder, here we achieved better results than existing techniques.

References
  1. Lee W and Stolfo S., “Data Mining techniques for intrusion detection”, In: Proc. of the 7th USENIX security symposium, San Antonio, TX, 1998.
  2. Denning D. (1987) “An Intrusion-Detection Model,” IEEE Transactions on Software Engineering, Vol. SE-13, No. 2, pp.222-232.
  3. K.P Lin and M.S Chen, “Efficient kernel approximation for large-scale support vector machine classification,” in Proceedings of the Eleventh SIAM International Conference on Data Mining, 2011, pp. 211–222.
  4. Pawlak Z: Rough sets Present state and the future. Foundations of computing and Decision sciences 18,157-163 (1993).
  5. Pawlak Z: Rough Sets and Intelligent Data Analysis, Information Sciences,2002, 147:1-12.
  6. Pawlak Z, Rough Sets, International Journal of Computer and Information Sciences, vol. 11, pp. 341-256, 1982.
  7. Boussouf M (1998) A Hybrid Approach to Feature Selection. Lecture Notes in Artificial Intelligence 1510:231–238.
  8. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html.
  9. Tavallaee M, Bagheri E, Wei Lu, Ghorbani A., "A detailed analysis of the KDD CUP 99 data set," Computational Intelligence for Security and Defence Applications, 2009. CISDA 2009. IEEE Symposium on , vol., no., pp.1,6, 8-10 July 2009
  10. Ravinder Reddy R, et al, “Real time anomaly detection using Ensemblers” Proceedings of 5ht ICISA IEEE conference.
  11. Jan G. Bazan, Marcin Szczuka, “The rough set exploration system (2005)” TRANSACTIONS ON ROUGH SETS III, springer.
  12. LIBSVM -- A Library for Support Vector Machines:www.csie.ntu.edu.tw/~cjlin/libsvm/
  13. R Ravinder Reddy, B.Kavya, Y Ramadevi. “A Survey on SVM Classifiers for Intrusion Detection” International Journal of Computer Applications (0975-8887) July 2014, pp: 38- 44.
  14. V.N.Vapnik, The nature of statistical learning theory. Springer-Verlag, New York. NY, 1995.
  15. C. Cortes and V. Vapnik, “Support-vector network,” Machine Learning, vol. 20, pp. 273–297, 1995
  16. Xu P and Chan A., An efficient algorithm on multi-class support vector machine model selection. Proceedings of the International Joint Conference on Neural Networks, 4:3229–3232, 2003.
  17. http://svms.org/kernels/
  18. en.wikipedia.org
  19. Reconfigurable Architecture for Network Intrusion Detection Using Principal Component Analysis, David Nguyen, Abhishek Das, Gokhan Memik, Alok Choudhary — 2006 — In Proc. ACM/SIGDA 14th international.
Index Terms

Computer Science
Information Sciences

Keywords

kernel trick anomaly detection support vector machine features selection.