Advertisement

A Self-trained Support Vector Machine Approach for Intrusion Detection

  • Santosh Kumar SahuEmail author
  • Durga Prasad Mohapatra
  • Sanjaya Kumar Panda
Conference paper
  • 11 Downloads
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 127)

Abstract

Intrusion refers to a set of attempts to compromise the confidentiality, integrity and availability (CIA) of the information system. Intrusion detection is the process of identifying such violations by analyzing the malicious attempts. Intrusion detection system is used to automate the intrusion detection process just in time or real-time and alert the system administrator for mitigating such efforts. Many researchers have been proposed several detection approaches in this context. In this paper, we adopt a semi-supervised learning-based support vector machine (SVM) approach for mitigating such malicious efforts. The proposed approach improves the learning process and the detection accuracy as compared to the standard SVM approach. Moreover, it requires less amount of labeled training data during the learning process. Our approach iteratively trains the labeled data, predicts the unlabeled data and further retrains the predicted instances. In this manner, it improves the training process and provides better result as compared to the standard SVM approach.

Keywords

Support vector machine Semi-supervised approach Self-trained model NSL-KDD KDD corrected GureKDD 

References

  1. 1.
    Allen J, Christie A, Fithen W, McHugh J, Pickel J (2000) State of the practice of intrusion detection technologies. Technical report, Carnegie-Mellon Software Engineering Institute, Pittsburgh, PAGoogle Scholar
  2. 2.
    Sahoo KS, Panda SK, Sahoo S, Sahoo B, Dash R (2019) Toward secure software-defined networks against distributed denial of service attack. J Supercomput 75(8):4829–4874CrossRefGoogle Scholar
  3. 3.
    Rout JK, Bhoi SK, Panda SK (2014) Sftp: a secure and fault-tolerant paradigm against blackhole attack in manet. arXiv preprint arXiv:1403.0338
  4. 4.
    Saha M, Panda SK, Panigrahi S (2019) Distributed computing security: issues and challenges. In: Cyber security in parallel and distributed computing: concepts, techniques, applications and case studies, pp 129–138Google Scholar
  5. 5.
    1852 cyber attacks hit India each minute last year; Mumbai, Delhi most affected. https://www.securitytoday.in/indian-news/1852-cyber-attacks-hit-india-each-minute-last-year-mumbai-delhi-most-affected/. Accessed 30 Nov 2019
  6. 6.
    Ahmad I, Basheri M, Iqbal MJ, Rahim A (2018) Performance comparison of support vector machine, random forest, and extreme learning machine for intrusion detection. IEEE Access 6:33,789–33,795Google Scholar
  7. 7.
    Tao P, Sun Z, Sun Z (2018) An improved intrusion detection algorithm based on GA and SVM. IEEE Access 6:13,624–13,631Google Scholar
  8. 8.
    Ghugar U, Pradhan J, Bhoi SK, Sahoo RR, Panda SK (2018) Pl-ids: physical layer trust based intrusion detection system for wireless sensor networks. In J Inf Technol 10(4):489–494Google Scholar
  9. 9.
    Catania CA, Garino CG (2012) Automatic network intrusion detection: current techniques and open issues. Comput Electr Eng 38(5):1062–1072Google Scholar
  10. 10.
    Porras PA, Valdes A (2001) Network surveillance. US Patent 6,321,338Google Scholar
  11. 11.
    Chen W-H, Hsu S-H, Shen H-P(2005) Application of SVM and ANN for intrusion detection. Comput Oper Res 32(10):2617–2634Google Scholar
  12. 12.
    Eskin E, Arnold A, Prerau M, Portnoy L, Stolfo S (2002) A geometric framework for unsupervised anomaly detection. In: Applications of data mining in computer security. Springer, Berlin, pp 77–101Google Scholar
  13. 13.
    Liao H-J, Richard Lin C-H, Lin Y-C,Tung K-Y (2013) Intrusion detection system: a comprehensive review. J Network Comput Appl 36(1):16–24Google Scholar
  14. 14.
    Patcha A, Park J-M (2007) An overview of anomaly detection techniques: existing solutions and latest technological trends. Comput Networks 51(12):3448–3470Google Scholar
  15. 15.
    Tan P-N (2018) Introduction to data mining. Pearson Education India, DelhiGoogle Scholar
  16. 16.
    Chien C-H, Sun Y-M, Chang W-C, Chiang-Hsieh P-Y, Lee T-Y, Tsai W-C, Horng J-T, Tsou A-P, Huang H-D (2011) Identifying transcriptional start sites of human micrornas based on high-throughput sequencing data. Nucleic Acids Res 39(21):9345–9356Google Scholar
  17. 17.
    Maulik U, Chakraborty D (2011) A self-trained ensemble with semisupervised SVM: An application to pixel classification of remote sensing imagery. Pattern Recogn 44(3):615–623Google Scholar
  18. 18.
    Li Y, Guan C, Li H, Chin Z (2008) A self-training semi-supervised SVM algorithm and its application in an EEG-based brain computer interface speller system. Pattern Recogn Lett 29(9):1285–1294Google Scholar
  19. 19.
    Chang C-C, Lin C-J (2011) LIBSVM: a library for support vector machines. ACM Trans Intell Syst Technol (TIST) 2(3):27Google Scholar
  20. 20.
    KDD cup 1999 data. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. Accessed 30 Nov 2019
  21. 21.
    NSL-KDD dataset. http://nsl.cs.unb.ca/NSL-KDD/. Accessed 30 Nov 2019
  22. 22.
    Gurekddcup dataset. http://www.sc.ehu.es/acwaldap/. Accessed 30 Nov 2019

Copyright information

© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021

Authors and Affiliations

  1. 1.National Institute of Technology RourkelaRourkelaIndia
  2. 2.National Institute of Technology WarangalWarangalIndia

Personalised recommendations