Skip to main content

A Self-trained Support Vector Machine Approach for Intrusion Detection

  • Conference paper
  • First Online:
Book cover Advances in Distributed Computing and Machine Learning

Abstract

Intrusion refers to a set of attempts to compromise the confidentiality, integrity and availability (CIA) of the information system. Intrusion detection is the process of identifying such violations by analyzing the malicious attempts. Intrusion detection system is used to automate the intrusion detection process just in time or real-time and alert the system administrator for mitigating such efforts. Many researchers have been proposed several detection approaches in this context. In this paper, we adopt a semi-supervised learning-based support vector machine (SVM) approach for mitigating such malicious efforts. The proposed approach improves the learning process and the detection accuracy as compared to the standard SVM approach. Moreover, it requires less amount of labeled training data during the learning process. Our approach iteratively trains the labeled data, predicts the unlabeled data and further retrains the predicted instances. In this manner, it improves the training process and provides better result as compared to the standard SVM approach.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Allen J, Christie A, Fithen W, McHugh J, Pickel J (2000) State of the practice of intrusion detection technologies. Technical report, Carnegie-Mellon Software Engineering Institute, Pittsburgh, PA

    Google Scholar 

  2. Sahoo KS, Panda SK, Sahoo S, Sahoo B, Dash R (2019) Toward secure software-defined networks against distributed denial of service attack. J Supercomput 75(8):4829–4874

    Article  Google Scholar 

  3. Rout JK, Bhoi SK, Panda SK (2014) Sftp: a secure and fault-tolerant paradigm against blackhole attack in manet. arXiv preprint arXiv:1403.0338

  4. Saha M, Panda SK, Panigrahi S (2019) Distributed computing security: issues and challenges. In: Cyber security in parallel and distributed computing: concepts, techniques, applications and case studies, pp 129–138

    Google Scholar 

  5. 1852 cyber attacks hit India each minute last year; Mumbai, Delhi most affected. https://www.securitytoday.in/indian-news/1852-cyber-attacks-hit-india-each-minute-last-year-mumbai-delhi-most-affected/. Accessed 30 Nov 2019

  6. Ahmad I, Basheri M, Iqbal MJ, Rahim A (2018) Performance comparison of support vector machine, random forest, and extreme learning machine for intrusion detection. IEEE Access 6:33,789–33,795

    Google Scholar 

  7. Tao P, Sun Z, Sun Z (2018) An improved intrusion detection algorithm based on GA and SVM. IEEE Access 6:13,624–13,631

    Google Scholar 

  8. Ghugar U, Pradhan J, Bhoi SK, Sahoo RR, Panda SK (2018) Pl-ids: physical layer trust based intrusion detection system for wireless sensor networks. In J Inf Technol 10(4):489–494

    Google Scholar 

  9. Catania CA, Garino CG (2012) Automatic network intrusion detection: current techniques and open issues. Comput Electr Eng 38(5):1062–1072

    Google Scholar 

  10. Porras PA, Valdes A (2001) Network surveillance. US Patent 6,321,338

    Google Scholar 

  11. Chen W-H, Hsu S-H, Shen H-P(2005) Application of SVM and ANN for intrusion detection. Comput Oper Res 32(10):2617–2634

    Google Scholar 

  12. Eskin E, Arnold A, Prerau M, Portnoy L, Stolfo S (2002) A geometric framework for unsupervised anomaly detection. In: Applications of data mining in computer security. Springer, Berlin, pp 77–101

    Google Scholar 

  13. Liao H-J, Richard Lin C-H, Lin Y-C,Tung K-Y (2013) Intrusion detection system: a comprehensive review. J Network Comput Appl 36(1):16–24

    Google Scholar 

  14. Patcha A, Park J-M (2007) An overview of anomaly detection techniques: existing solutions and latest technological trends. Comput Networks 51(12):3448–3470

    Google Scholar 

  15. Tan P-N (2018) Introduction to data mining. Pearson Education India, Delhi

    Google Scholar 

  16. Chien C-H, Sun Y-M, Chang W-C, Chiang-Hsieh P-Y, Lee T-Y, Tsai W-C, Horng J-T, Tsou A-P, Huang H-D (2011) Identifying transcriptional start sites of human micrornas based on high-throughput sequencing data. Nucleic Acids Res 39(21):9345–9356

    Google Scholar 

  17. Maulik U, Chakraborty D (2011) A self-trained ensemble with semisupervised SVM: An application to pixel classification of remote sensing imagery. Pattern Recogn 44(3):615–623

    Google Scholar 

  18. Li Y, Guan C, Li H, Chin Z (2008) A self-training semi-supervised SVM algorithm and its application in an EEG-based brain computer interface speller system. Pattern Recogn Lett 29(9):1285–1294

    Google Scholar 

  19. Chang C-C, Lin C-J (2011) LIBSVM: a library for support vector machines. ACM Trans Intell Syst Technol (TIST) 2(3):27

    Google Scholar 

  20. KDD cup 1999 data. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. Accessed 30 Nov 2019

  21. NSL-KDD dataset. http://nsl.cs.unb.ca/NSL-KDD/. Accessed 30 Nov 2019

  22. Gurekddcup dataset. http://www.sc.ehu.es/acwaldap/. Accessed 30 Nov 2019

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Santosh Kumar Sahu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sahu, S.K., Mohapatra, D.P., Panda, S.K. (2021). A Self-trained Support Vector Machine Approach for Intrusion Detection. In: Tripathy, A., Sarkar, M., Sahoo, J., Li, KC., Chinara, S. (eds) Advances in Distributed Computing and Machine Learning. Lecture Notes in Networks and Systems, vol 127. Springer, Singapore. https://doi.org/10.1007/978-981-15-4218-3_38

Download citation

Publish with us

Policies and ethics