Title :
A comparative study of techniques for intrusion detection
Author :
Mukkamala, Srinivas ; Sung, Andrew H.
Author_Institution :
Dept. of Comput. Sci., New Mexico Tech, USA
Abstract :
Due to increasing incidents of cyber attacks and heightened concerns for cyber terrorism, implementing effective intrusion detection systems (IDSs) is an essential task for protecting cyber security--as well as physical security because of the great dependence on networked computers for the operational control of various infrastructures. Building effective IDSs, unfortunately, has remained an elusive goal owing to the great technical challenges involved; and applied AI techniques are increasingly being utilized in attempts to overcome the difficulties. This paper presents a comparative study of using support vector machines (SVMs), artificial neural networks (ANNs), multivariate adaptive regression splines (MARS) and linear genetic programs (LGPs) for intrusion detection. We investigate and compare the performance of IDSs based on the mentioned techniques, with respect to a well-known set of intrusion evaluation data gathered by Lincoln Labs. Through a variety of experiments and analysis, it is found that, with appropriately chosen population size, program size, crossover rate and mutation rate, LGPs outperform other techniques in terms of detection accuracy at the expense of time. SVMs outperform MARS and ANNs in three critical aspects of intrusion detection: accuracy, training time, and testing time.
Keywords :
Internet; authorisation; computer crime; genetic algorithms; neural nets; safety systems; splines (mathematics); support vector machines; ANN; IDS; Lincoln Labs; MARS; SVM; artifical neural network; artificial intelligence; cyber attack; cyber security; cyber terrorism; information security; intrusion detection; intrusion evaluation data; linear genetic program; multivariate adaptive regression splines; network computer; physical security; support vector machine; Artificial intelligence; Computer networks; Computer security; Control systems; Intrusion detection; Mars; Physics computing; Protection; Support vector machines; Terrorism;
Conference_Titel :
Tools with Artificial Intelligence, 2003. Proceedings. 15th IEEE International Conference on
Print_ISBN :
0-7695-2038-3
DOI :
10.1109/TAI.2003.1250243