Skip to main content

Network Anomaly Classification by Support Vector Classifiers Ensemble and Non-linear Projection Techniques

  • Conference paper
Hybrid Artificial Intelligent Systems (HAIS 2013)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 8073))

Included in the following conference series:

Abstract

Network anomaly detection is currently a challenge due to the number of different attacks and the number of potential attackers. Intrusion detection systems aim to detect misuses or network anomalies in order to block ports or connections, whereas firewalls act according to a predefined set of rules. However, detecting the specific anomaly provides valuable information about the attacker that may be used to further protect the system, or to react accordingly. This way, detecting network intrusions is a current challenge due to growth of the Internet and the number of potential intruders. In this paper we present an intrusion detection technique using an ensemble of support vector classifiers and dimensionality reduction techniques to generate a set of discriminant features. The results obtained using the NSL-KDD dataset outperforms previously obtained classification rates.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Computing Surveys 41(3) (2009)

    Google Scholar 

  2. Hoffman, A., Schimitz, C., Sick, B.: Intrussion detection in computer networks with neural and fuzzy classifiers. In: Kaynak, O., Alpaydın, E., Oja, E., Xu, L. (eds.) ICANN 2003 and ICONIP 2003. LNCS, vol. 2714, pp. 316–324. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  3. Network Security Lab - Knowledge Discovery and Data Mining (NSL-KDD) (2007), http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html

  4. Tavallaee, M., Stakhanova, N., Ghorbani, A.: Toward credible evaluation of anomaly-based intrusion-detection methods. Trans. Sys. Man Cyber Part C 40, 516–524 (2010)

    Article  Google Scholar 

  5. Kayacik, H., Zincir-Heywood, A., Heywood, M.: A hierarchical som-based intrusion detection system. Journal Engineering Applications of Artificial Intelligence 20(4), 439–451 (2007)

    Article  Google Scholar 

  6. Eskin, E., Arnold, A., Prerau, M., Portnoy, L., Stolfo, S.: A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data. In: Applications of Data Mining in Computer Security. Kluwer (2002)

    Google Scholar 

  7. Theodoridis, S., Koutroumbas, K.: Pattern Recognition. Academic Press (2009)

    Google Scholar 

  8. Müller, K., Mika, S., Ratsch, G., Tsuda, B., Schölkopf, B.: An introduction to kernel-based learning algorithms. IEEE Transactions on Neural Networks 12(2), 181–201 (2003)

    Article  Google Scholar 

  9. Tenenbaum, J., de Silva, V., Langford, J.: A global geometric framework for nonlinear dimensionality reduction. Science 290, 2319–2323 (2000)

    Article  Google Scholar 

  10. Turk, M., Pentland, A.: Eigenfaces for recognition. Journal of Cognitive Neuroscience 3(1), 71–86 (1992)

    Article  Google Scholar 

  11. Vapnik, V.N.: Statistical Learning Theory. Wiley-Interscience (1998)

    Google Scholar 

  12. Bottou, L., Cortes, C., Denker, J., Drucker, H., Guyon, I., Jackel, L., LeCun, Y., Muller, U., Sackinger, E., Simard, P., Vapnik, V.: Comparison of classifier methods: A case study in handwriting digit recognition. In: Proc. International Conference on Pattern Recognition, pp. 77–87 (1994)

    Google Scholar 

  13. Bredensteiner, E., Bennett, K.: Multicategory classification by support vector machines. Computational Optimization and Applications 12(1-3), 53–79 (1999)

    Article  MathSciNet  MATH  Google Scholar 

  14. Lippmann, R., Fried, D., Graf, I., Haines, J., Kendball, K., McClung, D., Weber, D., Webster, S., Wyschgrod, D., Cuningham, R., Zissman, M.: Evaluating intrusion detection systems: the 1998 darpa off-line intrusion detection evaluation. Descex 2, 1012–1027 (2000)

    Google Scholar 

  15. McHugh, J.: Testing intrusion detection systems: a critique of the 1998 and 1999 darpa instrusion detection systems evaluation as performed by lyncoln laboratory. ACM Transactions on Information and Systems Security 3(4), 262–294 (2000)

    Article  Google Scholar 

  16. Panda, M., Abraham, A., Abraham, M.: Discriminative multinomial naïve bayes for network intrusion detection. In: 6th Conference on Information Assurance and Security, IAS (2010)

    Google Scholar 

  17. Nziga, J.: Minimal dataset for network intrusion detection systems via dimensionality reduction. In: 6th International Conference on Digital Information Management, ICDIM (2011)

    Google Scholar 

  18. Tavallaee, M., Bagheri, E., Wei, L., Ghorbani, A.: A detailed analysis of the kddcup 1999 dataset. In: Proceedings of the IEEE International Symposium on Computational Intelligence in Security and Defense Applications CISDA (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

de la Hoz, E., Ortiz, A., Ortega, J., de la Hoz, E. (2013). Network Anomaly Classification by Support Vector Classifiers Ensemble and Non-linear Projection Techniques. In: Pan, JS., Polycarpou, M.M., Woźniak, M., de Carvalho, A.C.P.L.F., Quintián, H., Corchado, E. (eds) Hybrid Artificial Intelligent Systems. HAIS 2013. Lecture Notes in Computer Science(), vol 8073. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40846-5_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-40846-5_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-40845-8

  • Online ISBN: 978-3-642-40846-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics