Advertisement

A t-SNE based non linear dimension reduction for network intrusion detection

  • Yasir HamidEmail author
  • M. Sugumaran
Original Research

Abstract

With the increased dependence on the internet for day to day activities, the need to keep the networks secure has become more vital. The quest of securing the computer systems and networks, from the users with destructive mindset, has resulted in the invention of surfeit devices and methods. One such method against whom the responsibility of discriminating between normal and harmful data, flowing on the network is, intrusion detection system (IDS). In this work an IDS model based on support vector machines is proposed. In order to enhance the detection capability of support vector machine based model for intrusion detection, and to eliminate the inherent problem of intrusion detection i.e, low accuracy of the system in detecting user to root and remote to local attacks, this paper proposes to use recent non-linear dimension reduction technique to enhance the discrimination of the data. Results demonstrate that t-SNE based dimension reduction improve the accuracy of SVM for network intrusion detection system. A comparison of the proposed system with the previous works has proven that this work has enhanced detection rate for almost all the attack groups.

Keywords

Classification Data visualization Dimension reduction Network intrusion detection NLDR PCA SVM t-SNE 

Notes

Compliance with ethical standards

Funding

This work is a part of my Ph.D. project and as such I haven’t recieved any funding from any agency for this work. All the expenses for carrying out for this work have been made by the authors.

Conflict of interest

Authors have declared that no competing interests exist.

Data availabity

The authors would be happy to share the data with the intreseted researchers.

References

  1. 1.
    Domingue J, Zahariadis T, Lambert D, Cleary F, Daras P, Krco S, Li M-S, Schaffers H, Lotz V, Stiller B et al (2011) The future internet. Springer, BerlinCrossRefGoogle Scholar
  2. 2.
    Tsai C-F, Lin C-Y (2010) A triangle area based nearest neighbors approach to intrusion detection. Pattern Recognit 43(1):222–229CrossRefzbMATHGoogle Scholar
  3. 3.
    Wang G, Hao J, Ma J, Huang L (2010) A new approach to intrusion detection using artificial neural networks and fuzzy clustering. Expert Syst Appl 37(9):6225–6232CrossRefGoogle Scholar
  4. 4.
    Liao Y, Vemuri VR (2005) Machine learning in intrusion detection. Enhancing Computer Security with Smart Technology, p 93Google Scholar
  5. 5.
    Hughes G (1968) On the mean accuracy of statistical pattern recognizers. IEEE Trans Inf Theory 14(1):55–63CrossRefGoogle Scholar
  6. 6.
    Dunteman GHC (1989) Principal components analysis. Sage, no. 69Google Scholar
  7. 7.
    Kruskal JB, Wish M (1978) Multidimensional scaling. Sage 11Google Scholar
  8. 8.
    Demartines P, Hérault J (1997) Curvilinear component analysis: a self-organizing neural network for nonlinear mapping of data sets. IEEE Trans Neural Netw 8(1):148–154CrossRefGoogle Scholar
  9. 9.
    Hinton GE, Roweis ST (2002) Stochastic neighbor embedding. In: Advances in neural information processing systems, pp 833–840Google Scholar
  10. 10.
    Lunga D, Ersoy O (2013) Spherical stochastic neighbor embedding of hyperspectral data. IEEE Trans Geosci Rem Sens 51(2):857–871CrossRefGoogle Scholar
  11. 11.
    Tenenbaum JB, De Silva V, Langford JC (2000) A global geometric framework for nonlinear dimensionality reduction. Science 290(5500):2319–2323CrossRefGoogle Scholar
  12. 12.
    Van Der Maaten L (2014) Accelerating t-sne using tree-based algorithms. J Mach Learn Res 15(1):3221–3245MathSciNetzbMATHGoogle Scholar
  13. 13.
    Hearst MA, Dumais ST, Osman E, Platt J, Scholkopf B (1998) Support vector machines. IEEE Intell Syst Appl 13(4):18–28CrossRefGoogle Scholar
  14. 14.
    Hamid Y, Sugumaran M, Balasaraswathi V (2016) Ids using machine learning-current state of art and future directions. Br J Appl Sci Technol 15(3)Google Scholar
  15. 15.
    Liao H-J, Lin C-HR, Lin Y-C, Tung K-Y (2013) Intrusion detection system: a comprehensive review. J Netw Comput Appl 36(1):16–24CrossRefGoogle Scholar
  16. 16.
    Tsai C-F, Hsu Y-F, Lin C-Y, Lin W-Y (2009) Intrusion detection by machine learning: a review. Expert Syst Appl 36(10):11994–12000CrossRefGoogle Scholar
  17. 17.
    Kim G, Lee S, Kim S (2014) A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Syst Appl 41(4):1690–1700MathSciNetCrossRefGoogle Scholar
  18. 18.
    Luo B, Xia J (2014) A novel intrusion detection system based on feature generation with visualization strategy. Expert Syst Appl 41(9):4139–4147MathSciNetCrossRefGoogle Scholar
  19. 19.
    Hamid Y, Sugumaran M, Journaux L (2016) A fusion of feature extraction and feature selection technique for network intrusion detection. Int J Secur Appl 10(8):151–158Google Scholar
  20. 20.
    Xia Y-X, Shi Z-C, Hu Z-H (2009) An incremental svm forintrusion detection based on key feature selection. In: Intelligent information technology application, 2009. IITA2009. Third International Symposium on IEEE, vol. 3, pp 205–208Google Scholar
  21. 21.
    Xie L, Zhu D, Yang H (2009) Research on svm based network intrusion detection classification. In: Fuzzy systems and knowledge discovery, 2009. FSKD’09. Sixth International Conference on IEEEGoogle Scholar
  22. 22.
    Mukkamala S, Janoski G, Sung A (2002) Intrusion detection using neural networks and support vector machines. In: Neural networks, 2002. IJCNN’02. Proceedings of the 2002 International Joint Conference on IEEE, vol. 2, pp 1702–1707Google Scholar
  23. 23.
    Heba FE, Darwish A, Hassanien AE, Abraham A (2010) Principle components analysis and support vector machine based intrusion detection system. In: 2010 10th international conference on intelligent systems design and applications, pp 363–367Google Scholar
  24. 24.
    Labib K, Vemuri VR (2006) An application of principal component analysis to the detection and visualization of computer network attacks. In: Annales des télécommunications, vol. 61, no. 1-2. Springer, pp 218–234Google Scholar
  25. 25.
    Kuchimanchi GK, Phoha VV, Balagani KS, Gaddam SR (2004) Dimensionreduction using feature extraction methods for real-time misusedetection systems. In: Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC, pp 195–202Google Scholar
  26. 26.
    Day CW (2006) Intrusion detection system using self-organizing clusters, uS Patent 7,017,186Google Scholar
  27. 27.
    Zanero S, Savaresi SM (2004) Unsupervised learning techniques for an intrusion detection system. In: Proceedings of the 2004 ACM symposium on Applied computing. ACM, pp 412–419Google Scholar
  28. 28.
    Day CW (2007) Intrusion detection system, US Patent 7,260,846Google Scholar
  29. 29.
    Dash SK, Rawat S, Pujari AK (2006) Lle on system calls for host based intrusion detection. In: 2006 international conference on computational intelligence and security, vol. 1, pp 609–612Google Scholar
  30. 30.
    Lee JA, Verleysen M (2007) Nonlinear dimensionality reduction. Springer, New YorkCrossRefzbMATHGoogle Scholar
  31. 31.
    Li Y, Wang Y, Zi Y, Zhang M (2015) An enhanced data visualization method for diesel engine malfunction classification using multi-sensor signals. Sensors 15(10):26675–26693CrossRefGoogle Scholar
  32. 32.
    Delion C, Journaux L, Payen A, Sautot L, Chevigny E, Curmi P (2015) Nldr methods for high dimensional nirs dataset: application to vineyard soils characterization. In: 23rd European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (ESANN’15)Google Scholar
  33. 33.
    Payen A, Journaux L, Delion C, Sautot L, Faivre B (2015) Efficient unsupervised clustering for spatial bird population analysis along the loire river. In: 23rd European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (ESANN’15)Google Scholar
  34. 34.
    Maaten Lvd, Hinton G (2008) Visualizing data using t-sne. J Mach Learn Res 9(Nov):2579–2605zbMATHGoogle Scholar
  35. 35.
    Camastra F, Vinciarelli A (2002) Estimating the intrinsic dimension of data with a fractal-based method. IEEE Trans Pattern Anal Mach Intell 24(10):1404–1407CrossRefGoogle Scholar
  36. 36.
    Horng S-J, Su M-Y, Chen Y-H, Kao T-W, Chen R-J, Lai J-L, Perkasa CD (2011) A novel intrusion detection system based on hierarchical clustering and support vector machines. Expert Syst Appl 38(1):306–313CrossRefGoogle Scholar
  37. 37.
    Toosi AN, Kahani M (2007) A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers. Comput Commun 30(10):2201–2212CrossRefGoogle Scholar
  38. 38.
    Xiang C, Yong PC, Meng LS (2008) Design of multiple-level hybrid classifier for intrusion detection system using bayesian clustering and decision trees. Pattern Recognit Lett 29(7):918–924CrossRefGoogle Scholar
  39. 39.
    Peddabachigari S, Abraham A, Grosan C, Thomas J (2007) Modeling intrusion detection system using hybrid intelligent systems. J Netw Comp Appl 30(1):114–132CrossRefGoogle Scholar

Copyright information

© Bharati Vidyapeeth's Institute of Computer Applications and Management 2019

Authors and Affiliations

  1. 1.Dept. of Computer Science and EngineeringPondicherry Engineering CollegePonidcherryIndia

Personalised recommendations