CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Adaptive Distributed Intrusion Detection using Hybrid K-means SVM Algorithm

by Amit Bhardwaj, Parneet Kaur
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 74 - Number 15
Year of Publication: 2013
Authors: Amit Bhardwaj, Parneet Kaur
10.5120/12963-0145

Amit Bhardwaj, Parneet Kaur . Adaptive Distributed Intrusion Detection using Hybrid K-means SVM Algorithm. International Journal of Computer Applications. 74, 15 ( July 2013), 33-37. DOI=10.5120/12963-0145

@article{ 10.5120/12963-0145,
author = { Amit Bhardwaj, Parneet Kaur },
title = { Adaptive Distributed Intrusion Detection using Hybrid K-means SVM Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { July 2013 },
volume = { 74 },
number = { 15 },
month = { July },
year = { 2013 },
issn = { 0975-8887 },
pages = { 33-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume74/number15/12963-0145/ },
doi = { 10.5120/12963-0145 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:42:23.922558+05:30
%A Amit Bhardwaj
%A Parneet Kaur
%T Adaptive Distributed Intrusion Detection using Hybrid K-means SVM Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 74
%N 15
%P 33-37
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Assuring secure and reliable operation of networks has become a priority research area these days because of ever growing dependency on network technology. Intrusion detection systems (IDS) are used as the last line of defense. Intrusion Detection System identifies patterns of known intrusions (misuse detection) or differentiates anomalous network data from normal data (anomaly detection). In this paper, a novel Intrusion Detection System (IDS) architecture is proposed which includes both anomaly and misuse detection approaches. The hybrid Intrusion Detection System architecture consists of centralized anomaly detection and distributed signature detection modules. Proposed anomaly detection module uses hybrid machine learning algorithm called k-means clustering support vector machine (KSVM). This hybrid system couples the benefits of low false-positive rate of signature-based intrusion detection system and anomaly detection system's ability to detect new unknown attacks.

References
  1. Liu, Jianxiao, and Lijuan Li. "A Distributed Intrusion Detection System Based on Agents. " Computational Intelligence and Industrial Application, 2008. PACIIA'08. Pacific-Asia Workshop on. Vol. 1. IEEE, 2008.
  2. Huang, Weijian, Yan An, and Wei Du. "A Multi-Agent-based Distributed Intrusion Detection System. " Advanced Computer Theory and Engineering (ICACTE), 2010 3rd International Conference on. Vol. 3. IEEE, 2010.
  3. Eskin, Eleazar, Matthew Miller, Zhi-Da Zhong, George Yi, Wei-Ang Lee, and Salvatore Stolfo. "Adaptive model generation for intrusion detection systems. " (2000).
  4. Hossain, Mahmood, and Susan M. Bridges. "A framework for an adaptive intrusion detection system with data mining. " 13th Annual Canadian Information Technology Security Symposium. 2001.
  5. Fraley, Chris, and Adrian E. Raftery. "How many clusters? Which clustering method? Answers via model-based cluster analysis. " The computer journal 41. 8 (1998): 578-588.
  6. (2002) The IEEE website. [Online]. Available: http://www. ieee. org/
  7. Finley, Thomas, and Thorsten Joachims. "Supervised clustering with support vector machines. " Proceedings of the 22nd international conference on Machine learning. ACM, 2005.
  8. Jaisankar, N. , Swetha Balaji, S. Lalita, and D. Sruthi. "Intrusion Detection System Using K-SVMeans Clustering Algorithm. "
  9. Xia, Xiao-Lei, Michael R. Lyu, Tat-Ming Lok, and Guang-Bin Huang. "Methods of decreasing the number of support vectors via K-mean clustering. " In Advances in Intelligent Computing, pp. 717-726. Springer Berlin Heidelberg, 2005.
  10. Vishwanathan, S. V. M. , and M. Narasimha Murty. "SSVM: a simple SVM algorithm. " Neural Networks, 2002. IJCNN'02. Proceedings of the 2002 International Joint Conference on. Vol. 3. IEEE, 2002.
  11. Wang, Jiaqi, Xindong Wu, and Chengqi Zhang. "Support vector machines based on K-means clustering for real-time business intelligence systems. " International Journal of Business Intelligence and Data Mining 1, no. 1 (2005): 54-64.
  12. Xie, Lixia, Dan Zhu, and Hongyu Yang. "Research on SVM based network intrusion detection classification. " In Fuzzy Systems and Knowledge Discovery, 2009. FSKD'09. Sixth International Conference on, vol. 7, pp. 362-366. IEEE, 2009.
  13. Fang, Xiaozhao, Wei Zhang, Shaohua Teng, and Na Han. "A Research on Intrusion Detection Based on Support Vector Machines. " In Communications and Intelligence Information Security (ICCIIS), 2010 International Conference on, pp. 109-112. IEEE, 2010
  14. Shuyue, Wu, Yu Jie, and Fan Xiaoping. "Research on Intrusion Detection Method Based on SVM Co-training. " In Intelligent Computation Technology and Automation (ICICTA), 2011 International Conference on, vol. 2, pp. 668-671. IEEE, 2011.
  15. Lakhina, Anukool, Mark Crovella, and Christophe Diot. "Mining anomalies using traffic feature distributions. " In ACM SIGCOMM Computer Communication Review, vol. 35, no. 4, pp. 217-228. ACM, 2005.
  16. Ben-Hur, Asa, David Horn, Hava T. Siegelmann, and Vladimir Vapnik. "A support vector clustering method. " In Pattern Recognition, 2000. Proceedings. 15th International Conference on, vol. 2, pp. 724-727. IEEE, 2000.
  17. Denning, Dorothy E. "An intrusion-detection model. " Software Engineering, IEEE Transactions on 2 (1987): 222-232.
  18. Huang, Ming-Yuh, Robert J. Jasper, and Thomas M. Wicks. "A large scale distributed intrusion detection framework based on attack strategy analysis. " Computer Networks 31, no. 23 (1999): 2465-2475
  19. Lee, Wenke, Salvatore J. Stolfo, and Kui W. Mok. "Adaptive intrusion detection: A data mining approach. " Artificial Intelligence Review 14, no. 6 (2000): 533-567.
  20. Botía, Juan A. , Jorge J. Gómez-Sanz, and Juan Pavón. "Intelligent data analysis for the verification of multi-agent systems interactions. " In Intelligent Data Engineering and Automated Learning–IDEAL 2006, pp. 1207-1214. Springer Berlin Heidelberg, 2006.
  21. Arora, A. , D. B. Marshall, B. R. Lawn, and M. V. Swain. "Indentation deformation/fracture of normal and anomalous glasses. " Journal of Non-Crystalline Solids 31, no. 3 (1979): 415-428.
  22. Axelsson, Stefan. "The base-rate fallacy and the difficulty of intrusion detection. " ACM Transactions on Information and System Security (TISSEC) 3, no. 3 (2000): 186-205.
  23. Wen, Yi-Min, and Bao-Liang Lu. "A cascade method for reducing training time and the number of support vectors. " In Advances in Neural Networks–ISNN 2004, pp. 480-486. Springer Berlin Heidelberg, 2004.
Index Terms

Computer Science
Information Sciences

Keywords

Adaptive Distributed k-means clustering Intrusion Detection System Support Vector Machine