DocumentCode :
1988929
Title :
The Application of Machine Learning Methods to Intrusion Detection
Author :
Zhang, Xin ; Jia, Li ; Shi, Hongyan ; Tang, Zhongbin ; Wang, Xiaoling
Author_Institution :
Dept. of Fundamental Courses, Xuzhou Air Force Coll., Xuzhou, China
fYear :
2012
fDate :
27-30 May 2012
Firstpage :
1
Lastpage :
4
Abstract :
Network and system security is of paramount importance in the present data communication environment. Hackers and intruders can create many successful attempts to cause the crash of the networks and web services by unauthorized intrusion. New threats and associated solutions to prevent these threats are emerging together with the secured system evolution. Intrusion Detection Systems (IDS) are one of these solutions. The main function of Intrusion Detection System is to protect the resources from threats. It analyzes and predicts the behaviours of users, and then these behaviours will be considered an attack or a normal behaviour. We use Rough Set Theory (RST) and Support Vector Machine (SVM) to detect network intrusions. First, packets are captured from the network, RST is used to pre-process the data and reduce the dimensions. The features selected by RST will be sent to SVM model to learn and test respectively. The method is effective to decrease the space density of data. The experiments compare the results with Principal Component Analysis (PCA) and show RST and SVM schema could reduce the false positive rate and increase the accuracy.
Keywords :
Web services; authorisation; computer crime; data communication; learning (artificial intelligence); principal component analysis; rough set theory; support vector machines; IDS; PCA; RST; SVM schema; Web services; attack behavior; data communication environment; false positive rate; hackers; intruders; intrusion detection systems; machine learning methods; network intrusion detection; network security; normal behaviour; principal component analysis; rough set theory; secured system evolution; space density; support vector machine; system security; unauthorized intrusion; Feature extraction; Intrusion detection; Libraries; Principal component analysis; Rough sets; Support vector machines;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Engineering and Technology (S-CET), 2012 Spring Congress on
Conference_Location :
Xian
Print_ISBN :
978-1-4577-1965-3
Type :
conf
DOI :
10.1109/SCET.2012.6341943
Filename :
6341943
Link To Document :
بازگشت