CFP last date
20 January 2025
Reseach Article

Cyber Attack Classification based on Parallel Support Vector Machine

Published on May 2012 by Mital Patel, Yogdhar Pandey
National Conference on Recent Trends in Computing
Foundation of Computer Science USA
NCRTC - Number 4
May 2012
Authors: Mital Patel, Yogdhar Pandey
1b3f33c7-5b4b-4cbd-9baf-635db04a5087

Mital Patel, Yogdhar Pandey . Cyber Attack Classification based on Parallel Support Vector Machine. National Conference on Recent Trends in Computing. NCRTC, 4 (May 2012), 12-14.

@article{
author = { Mital Patel, Yogdhar Pandey },
title = { Cyber Attack Classification based on Parallel Support Vector Machine },
journal = { National Conference on Recent Trends in Computing },
issue_date = { May 2012 },
volume = { NCRTC },
number = { 4 },
month = { May },
year = { 2012 },
issn = 0975-8887,
pages = { 12-14 },
numpages = 3,
url = { /proceedings/ncrtc/number4/6538-1028/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Recent Trends in Computing
%A Mital Patel
%A Yogdhar Pandey
%T Cyber Attack Classification based on Parallel Support Vector Machine
%J National Conference on Recent Trends in Computing
%@ 0975-8887
%V NCRTC
%N 4
%P 12-14
%D 2012
%I International Journal of Computer Applications
Abstract

Cyber attack is becoming a critical issue of organizational information systems. A number of cyber attack detection methods have been introduced with different levels of success that is used as a countermeasure to preserve data integrity and system availability from attacks. The classification of attacks against computer network is becoming a harder problem to solve in the field of network security. This paper describes a Subset Selection Decision Fusion method to choose features (attributes) of KDDCUP 1999 intrusion detection dataset. Selection algorithm for distributed cyber attack detection and classification is proposed. Different types of attacks together with the normal condition of the network are modeled as different classes of the network data. We proposed Parallel Support Vector Machine (PSVM) algorithm for detection and classification of cyber attack dataset. Support Vector Machines (SVM) are the classifiers which were originally designed for binary c1assificatio. n. The c1assificatioin applications can solve multi-class problems. Result shows that PSVM gives more detection accuracy for classes and comparable to false alarm rate.

References
  1. KDD Cup 1999. Available on: http://kdd. ics. uci. edu/databases/kddcup99/ kddcup99. html, October 2007.
  2. Snehal A. Mulay, P. R. Devale, G. v. Garje," Intrusion Detection System using Support Vector Machine and Decision Tree", International Journal of Computer Applications (0975 - 8887) Volume 3 - No. 3, June 2010
  3. Latifur Khan. Mamoun Awad, Bhavani Thuraisingham, "A new intrusion detection system using support vector machines and hierarchical clustering",The VLDB Journal DOl 1O. 1007/s00778- 006-0002. 2007.
  4. YMahbod Tavallaee, Ebrahim Bagheri, Wei Lu, and Ali A. Ghorbani. "A detailed analysis of KDD CUP'99 data set", IEEE-2009.
  5. http://kdd. ics. uci. eduidatabaseslkddcup99/kddcup99. html
  6. G. MeeraGandhi, Kumaravel Appavoo, S. K. Srivatsa," Effective Network Intrusion Detection using Classifiers Decision Trees and Decision rules" Int. J. Advanced Networking and Applications Volume: 02, Issue: 03, Pages: 686-692 ,2010
  7. P. Srinivasulu, R. Satya Prasad and I. Ramesh Babu," Intelligent Network Intrusion Detection Using DT and BN Classification Techniques" Int. J. Advance. Soft Comput. Appl. , Vol. 2, No. 1, March 2010 ISSN 2074-8523; Copyright © ICSRS Publication, 2010, www. i-csrs. org
  8. Shailendra Singh Member, IEEE, IAENG, Sanjay Agrawal, Murtaza,A. Rizvi and Ramjeevan Singh Thakur, "Improved Support Vector Machine for Cyber Attack Detection", Proceedings of The World Congress on Engineering and Computer Science 2011 Vol I WCECS 2011, October 19-21, 2011, San Francisco, USA
  9. Hoa Dinh Nguyen, Qi Cheng," An Efficient Feature Selection Method For Distributed Cyber Attack Detection and Classification",978•1-4244-9848•2/11 $26. 00©2011 IEEE
  10. Dr. Adnan Mohsin Abdulazeez Brifcani & Adel Sabry Issa," Intrusion Detection and Attack No. 2, 2011
  11. S. J. Stolfo, W. Fan, W. Lee, A. Prodromidis, and P. K. Chan, "Costbased modeling for fraud and intrusion detection: Results from the jam project," discex, vol. 02, p. 1130, 2000.
  12. R. P. Lippmann, D. J. Fried, I. Graf, J. W. Haines, K. R. Kendall,D. McClung, D. Weber, S. E. Webster, D. Wyschogrod, R K. Cunningham, and M. A. Zissman "Evaluating intrusion Detection systems: The 1998 darpa off-line intrusion detection evaluation," discex, vol. 02, p. 1012, 2000.
  13. Xiong, Sheng-Wu, Liu Hong-bing, Niu Xiao-xiao, Fuzzy support vector machines based on FCM clustering. Proceddings of the fourth international conference on Machine Learning and Cybernetics, Guangzhou, China, Aug 18-21, IEEE, p. 2608-2613, 2005.
  14. A. K. Ghosh and A. Schwartzbard. "A study in Using Neural Networks for Anomaly and Misuse detection" Proceeding of the 8th USENIX Security Symposium, pp. 23-36. Washington, D. C. US. 1999
  15. Mukkamala S. , Sung AH, Abraham A. Modeling Inrusion Detection Systems Using linear genetic programming approach, The 17th international conference on industrial & engineering applications of artificial intelligence and expert systems, innovation in applied artificial intelligence.
  16. W. Lee, S. J. Stolfo and K. Mok. Data mining in work flow environments: Experience in intrusion detection, Proceedings of the Conference on Knowledge Discovery and Data Mining (KDD-99), 1999.
  17. Liu Yi-hung, Chen Yen-ting, face recognition using total margin based adaptive fuzzy support vector machines. IEEE Transactions on Neural Networks, 18(1): 178-192, 2007.
Index Terms

Computer Science
Information Sciences

Keywords

Distributed Cyber Attack Detection And Classification Subset Selection Decision Fusion Parallel Support Vector Machine Kddcup'99 And Confusion Matrix