Nothing Special   »   [go: up one dir, main page]

Skip to main content

Network Intrusion Detection Method Based on Optimized Multiclass Support Vector Machine

  • Conference paper
  • First Online:
Artificial Intelligence and Robotics (ISAIR 2022)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1701))

Included in the following conference series:

  • 552 Accesses

Abstract

With the popularization of network applications and the great changes in the international political, economic and military situations, network security is becoming more and more important. As an important part of network security, network intrusion detection (NID) is still facing the problem of low detection rate and difficulty to meet the real-time demand with the rapid increase of network traffic. Therefore, for the requirement of fast and accurate detection in real-time applications, this paper proposes a NID method based on optimized multiclass support vector machine (SVM). Firstly, the ReliefF feature selection algorithm is introduced to extract features with heuristic search rules based on variable similarity, which reduces the complexity of features and the amount of calculation; Secondly, a SVM training method based on data block method is proposed to improve the training speed; Finally, a multiclass SVM classifier is designed for typical attack types. Experimental results show that the proposed optimization method can achieve a detection rate of 96.9% and shorten the training time by 13.2% on average.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Aldweesh, A., Derhab, A., Emam, A.Z.: Deep learning approaches for anomaly-based intrusion detection systems: a survey, taxonomy, and open issues. Knowl.-Based Syst. 189, 105124 (2020)

    Article  Google Scholar 

  2. Zheng, Q., Zhu, J., Tang, H., Liu, X., Li, Z., Lu, H.: Generalized label enhancement with sample correlations. IEEE Trans. Knowl. Data Eng. (2021)

    Google Scholar 

  3. Lu, H., Li, Y., Chen, M., Kim, H., Serikawa, S.: Brain intelligence: go beyond artificial intelligence. Mobile Networks and Applications 23(2), 368–375 (2017). https://doi.org/10.1007/s11036-017-0932-8

    Article  Google Scholar 

  4. Xu, F., Xu, F., Xie, J., Pun, C., Lu, H., Gao, H.: Action recognition framework in traffic scene for autonomous driving system. IEEE Transactions on Intelligent Transportation Systems (2022)

    Google Scholar 

  5. Viegas, E., Santin, A.O., Abreu, V., Jr.: Machine learning intrusion detection in big data era: a multi-objective approach for longer model lifespans. IEEE Trans. Netw. Sci. Eng. 8(1), 366–376 (2021)

    Article  Google Scholar 

  6. Imrana, Y., Xiang, Y., Ali, L., Abdul-Rauf, Z.: A bidirectional LSTM deep learning approach for intrusion detection. Expert System and Applications 185, 115524 (2021)

    Article  Google Scholar 

  7. Chou, D., Jiang, M.: A survey on data-driven network intrusion detection. ACM Comput. Surv. (CSUR) 54, 1–36 (2021)

    Article  Google Scholar 

  8. Nie, L., Ning, Z., Wang, X., Hu, X., Cheng, J., Li, Y.: Data-driven intrusion detection for intelligent internet of vehicles: a deep convolutional neural network-based method. IEEE Trans. Netw. Sci. Eng. 7(4), 2219–2230 (2020)

    Article  MathSciNet  Google Scholar 

  9. Chikkalwar, S.R., Garapati, Y.: Autoencoder-support vector machine-grasshopper optimization for intrusion detection system. Int. J. Intell. Eng. Syst. 15(4), 406–414 (2020)

    Google Scholar 

  10. Ponmalar, A., Dhanakoti, V.: An intrusion detection approach using ensemble support vector machine based chaos game optimization algorithm in big data platform. Appl. Soft. Comput. 116, 108295 (2022)

    Article  Google Scholar 

  11. Rajesari, P.V.N., Shashi, M., Pao, T.K., Rajya Lakshmi, M., Kiran, L.V.: Effective intrusion detection system using concept drifting data stream and support vector machine. Concurrency and Computation-Practice & Experience 34, e7118 (2022)

    Google Scholar 

  12. http://kdd.ics.uci.edu/databased/kddcup99/kddcup99.html (2001)

  13. Zhang, B.S., Li, Y.Y., Chai, Z.: A novel random multi-subspace based ReliefF for feature selection. Knowl.-Based Syst. 252, 109400 (2022)

    Article  Google Scholar 

  14. Li, Y., Lu, H., Li, J., Li, X., Li, Y., Serikawa, S.: Underwater image de-scattering and classification by deep neural network. Comput. Electr. Eng. 54, 68–77 (2016)

    Article  Google Scholar 

  15. Zhao, W., Wang, M., Liu, Y., Lu, H., Xu, C., Yao, L.: Generalizable crowd counting via diverse context style learning. IEEE Trans. Circuits Syst. Video Technol. (2022)

    Google Scholar 

  16. Beitollahi, H., Sharif, D.M., Fazeli, M.: Application layer DDoS attack detection using cuckoo search algorithm-trained radial basis function. IEEE Access 10, 63844–63854 (2022)

    Article  Google Scholar 

  17. Modjtaba, R., Dawood, S.J.: Two fast and accurate heuristic RBF learning rules for data classification. Neural Netw. 75, 150–161 (2016)

    Article  MATH  Google Scholar 

  18. Elkan, C.: Results of the KDD’99 classifier learning. ACM SIGKDD Explorations Newsl. 1(2), 63–64 (2000)

    Article  Google Scholar 

Download references

Acknowledgment

This research was partially supported by the Scientific and Technological Innovation 2030 - Major Project of New Generation Artificial Intelligence (2020AAA0104603), Science and technology plan of Shaanxi Province (2021JQ-576) and the Yulin Science and Technology Plan Projects (CXY-2020-026).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mei Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, Y., Shang, S., Wang, N., Wang, M. (2022). Network Intrusion Detection Method Based on Optimized Multiclass Support Vector Machine. In: Yang, S., Lu, H. (eds) Artificial Intelligence and Robotics. ISAIR 2022. Communications in Computer and Information Science, vol 1701. Springer, Singapore. https://doi.org/10.1007/978-981-19-7943-9_24

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-7943-9_24

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-7942-2

  • Online ISBN: 978-981-19-7943-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics