Improved Kernel Based Intrusion Detection System

  • Byung-Joo Kim
  • Il Kon Kim
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4132)


Computer security has become a critical issue with the rapid development of business and other transaction systems over the Internet. The application of artificial intelligence, machine learning and data mining techniques to intrusion detection systems has been increasing recently. But most research is focused on improving the classification performance of a classifier. Selecting important features from input data leads to simplification of the problem, and faster and more accurate detection rates. Thus selecting important features is an important issue in intrusion detection. Another issue in intrusion detection is that most of the intrusion detection systems are performed by off-line and it is not a suitable method for a real-time intrusion detection system. In this paper, we develop the real-time intrusion detection system, which combines an on-line feature extraction method with the on-line Least Squares Support Vector Machine classifier. Applying the proposed system to KDD CUP 99 data, experimental results show that it has a remarkable feature feature extraction, classification performance and reducing detection time compared to existing off-line intrusion detection system.


Support Vector Machine Intrusion Detection Little Square Support Vector Machine Intrusion Detection System Feature Extraction Method 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Eskin, E.: Anomaly detection over noisy data using learned probability distribution. In: Proceedings of the Seventeenth International Conference on Machine Learning, pp. 443–482 (2000)Google Scholar
  2. 2.
    Ghosh, A., Schwartzbard, A.: A Study in using neural networks for anomaly and misuse detection. In: Proceedings of the Eighth USENIX Security Symposium, pp. 443–482 (1999)Google Scholar
  3. 3.
    Lee, W., Stolfo, S.J., Mok, K.: A Data mining in workflow environments.:Experience in intrusion detection. In: Proceedings of the 1999 Conference on Knowledge Discovery and Data Mining (1999)Google Scholar
  4. 4.
    Tipping, M.E., Bishop, C.M.: Mixtures of probabilistic principal component analysers. Neural Computation 11(2), 443–482 (1998)CrossRefGoogle Scholar
  5. 5.
    Kramer, M.A.: Nonlinear principal component analysis using autoassociative neural networks. AICHE Journal 37(2), 233–243 (1991)CrossRefGoogle Scholar
  6. 6.
    Diamantaras, K.I., Kung, S.Y.: Principal Component Neural Networks: Theory and Applications. John Wiley & Sons, Inc., New York (1996)MATHGoogle Scholar
  7. 7.
    Kim, B.J., Shim, J.Y., Hwang, C.H., Kim, I.K.: On-line Feature Extraction Based on Emperical Feature Map. In: Zhong, N., Raś, Z.W., Tsumoto, S., Suzuki, E. (eds.) ISMIS 2003. LNCS (LNAI), vol. 2871, pp. 440–444. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  8. 8.
    Softky, W.S., Kammen, D.M.: Correlation in high dimensional or asymmetric data set: Hebbian neuronal processing. Neural Networks 4, 337–348 (1991)CrossRefGoogle Scholar
  9. 9.
    Gupta, H., Agrawal, A.K., Pruthi, T., Shekhar, C., Chellappa., R.: An Experimental Evaluation of Linear and Kernel-Based Methods for Face Recognition, Accessible at,
  10. 10.
    Liu, J., Chen, J.P., Jiang, S., Cheng, J.: Online LS-SVM for function estimation and classification. Journal of University of Science and Technology Beijing 10(5), 73–77 (2003)Google Scholar
  11. 11.
    Vapnik, V.N.: Statistical learning theory. John Wiley & Sons, New York (1998)MATHGoogle Scholar
  12. 12.
    Hall, P., Marshall, D., Martin, R.: On-line eigenalysis for classification. In: British Machine Vision Conference, September 1998, vol. 1, pp. 286–295 (1998) Google Scholar
  13. 13.
    Winkeler, J., Manjunath, B.S., Chandrasekaran, S.: Subset selection for active object recognition. In: CVPR, June 1999, vol. 2, pp. 511–516. IEEE Computer Society Press, Los Alamitos (1999)Google Scholar
  14. 14.
    Murakami, H., Kumar., B.V.K.V.: Efficient calculation of primary images from a set of images. IEEE PAMI 4(5), 511–515 (1982)Google Scholar
  15. 15.
    Scholkopf, B., Smola, A., Muller, K.R.: Nonlinear component analysis as a kernel eigenvalue problem. Neural Computation 10(5), 1299–1319 (1998)CrossRefGoogle Scholar
  16. 16.
    Tsuda, K.: Support vector classifier based on asymmetric kernel function. In: Proc. ESANN (1999)Google Scholar
  17. 17.
    Mika, S.: Kernel algorithms for nonlinear signal processing in feature spaces. Master’s thesis, Technical University of Berlin (November 1998)Google Scholar
  18. 18.
  19. 19.
    Gestel, V.T., Suykens, J.A., Lanckriet, G., Lambrechts, A., De Moor, B. Vandewalle, J.: A Bayesian Framework for Least Squares Support Vector Machine Classifiers. Internal Report 00-65, ESAT-SISTA, K.U. Leuven Google Scholar
  20. 20.
    Suykens, J.A.K., Vandewalle, J.: Multiclass Least Squares Support Vector Machines. In: Proc. International Joint Conference on Neural Networks (IJCNN 1999), Washington DC (1999)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Byung-Joo Kim
    • 1
  • Il Kon Kim
    • 2
  1. 1.Dept. of Network and Information EngineeringYoungsan UniversityKyoungnamKorea
  2. 2.Department of Computer ScienceKyungpook National UniversityKorea

Personalised recommendations