CFP last date
20 December 2024
Reseach Article

Anomaly Detection based on Machine Learning: Dimensionality Reduction using PCA and Classification using SVM

by Annie George
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 47 - Number 21
Year of Publication: 2012
Authors: Annie George
10.5120/7470-0475

Annie George . Anomaly Detection based on Machine Learning: Dimensionality Reduction using PCA and Classification using SVM. International Journal of Computer Applications. 47, 21 ( June 2012), 5-8. DOI=10.5120/7470-0475

@article{ 10.5120/7470-0475,
author = { Annie George },
title = { Anomaly Detection based on Machine Learning: Dimensionality Reduction using PCA and Classification using SVM },
journal = { International Journal of Computer Applications },
issue_date = { June 2012 },
volume = { 47 },
number = { 21 },
month = { June },
year = { 2012 },
issn = { 0975-8887 },
pages = { 5-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume47/number21/7470-0475/ },
doi = { 10.5120/7470-0475 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:42:25.863461+05:30
%A Annie George
%T Anomaly Detection based on Machine Learning: Dimensionality Reduction using PCA and Classification using SVM
%J International Journal of Computer Applications
%@ 0975-8887
%V 47
%N 21
%P 5-8
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Anomaly detection has emerged as an important technique in many application areas mainly for network security. Anomaly detection based on machine learning algorithms considered as the classification problem on the network data has been presented here. Dimensionality reduction and classification algorithms are explored and evaluated using KDD99 dataset for network IDS. Principal Component Analysis for dimensionality reduction and Support Vector Machine for classification have been considered for the application on network data and the results are analysed. The result shows the decrease in execution time for the classification as we reduce the dimension of the input data and also the precision and recall parameter values of the classification algorithm shows that the SVM with PCA method is more accurate as the number of misclassification decreases.

References
  1. M. M. Sebring, E. Shellhouse, M. E. Hanna, and R. Alan Whitehurst, "Expert systems in intrusion detection: A case study", In Proceedings of the 11th National Comput Security Conference, Baltimore, Maryland.
  2. W. K. Lee, S. J. Stolfo, "A data mining framework for building intrusion detection model", In: Gong L. , Reiter M. K. (eds. ): Proceedings of the IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1999.
  3. W. K. Lee, et al. , "Mining audit data to build intrusion detection models", In Proc. Int. Conf. Knowledge Discovery and Data Mining (KDD'98), pp. 66-72, 1998.
  4. H. Güne? Kayac?k, A. NurZincir-Heywood, Malcolm I. Heywood, "Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99 Intrusion Detection Datasets", Dalhousie University, Faculty of Computer Science, 6050 University Avenue, Halifax, Nova Scotia.
  5. Mahbod Tavallaee,Ebrahim Bagheri, Wei Lu, and Ali A. Ghorbani, "A Detailed Analysis of the KDD CUP 99 Data Set ", Proceedings of the IEEE Symposium on Computational Intelligence in Security and Security Applications, 2009.
  6. Fengxi Song, Zhongwei Guo, Dayong Mei, "Feature selection using principal component analysis", Department of Automation and Simulation New Star Research Inst. Of Applied Tech. in Hefei City Hefei, China, International Conference on System Science, Engineering Design and Manufacturing Informatization, 2010.
  7. Lindsay I Smith, "A tutorial on Principal Components Analysis".
  8. CHEN Bo, Ma Wu, "Research of Intrusion Detection based on Principal Components Analysis", Information Engineering Institute, Dalian University, China, Second International Conference on Information and Computing Science, 2009.
  9. Chin-Jen Lin, "Formulations of Support Vector Machines: A Note from an Optimization Point of View", Department of Computer Science and Information Engineering, National Taiwan University, Neural Computation 13, 2001.
  10. Zhangxue-qin, Gu chun-hua and Linjia-jun, "Intrusion detection system based on feature selection and support vector machine", East China University of Science and Technology, Proceedings of IEEE, 2006.
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion Detection Anomaly Detection Principal Component Analysis Support Vector Machine