By Topic

Feature Selection and Design of Intrusion Detection System Based on k-Means and Triangle Area Support Vector Machine

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Pingjie Tang ; Dept. Comput. Sci. & Eng., Dalian Univ. of Technol., Dalian, China ; Rong-an Jiang ; Mingwei Zhao

Nowadays, challenged by malicious use of network and intentional attacks on personal computer system, intrusion detection system has become an indispensible and infrastructural mechanism for securing critical resource and information. Most current intrusion detection systems focus on hybrid supervised and unsupervised machine learning technologies. The related work has demonstrated that they can get superior performance than applying single machine learning algorithm in detection model. Besides, with the scrutiny of related works, feature selecting and representing techniques are also essential in pursuit of high efficiency and effectiveness. Performance of specified attack type detection should also be improved and evaluated. In this paper, we incorporate information gain (IG) method for selecting more discriminative features and triangle area based support vector machine (TASVM) by combining k-means clustering algorithm and SVM classifier to detect attacks. Our system achieves accuracy of 99.83%, detection rate of 99.88% and false alarm rate of 2.99% on the 10% of KDD CUP 1999 evaluation data set. We also achieve a better detection performance for specific attack types concerning precision and recall.

Published in:

Future Networks, 2010. ICFN '10. Second International Conference on

Date of Conference:

22-24 Jan. 2010