Abstract
Presently, Network security is the most concerned subject matter because with the rapid use of internet technology and further dependence on network for keeping our data secure, it’s becoming impossible to protect from vulnerable attacks. Intrusion detection systems (IDS) are the key solution for detecting these attacks so that the network remains reliable. There are different classification approaches used to implement IDS in order to increase their efficiency in terms of detection rate. Support vector machine (SVM) is used for classification in IDS due to its good generalization ability and non linear classification using different kernel functions and performs well as compared to other classifiers. Different Kernels of SVM are used for different problems to enhance performance rate. In this paper, we provide a review of the SVM and its kernel approaches in IDS for future research and implementation towards the development of optimal approach in intrusion detection system with maximum detection rate and minimized false alarms.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ahmad, I., Abdullah, A.B., Alghamdi, A.S.: Artificial neural network approaches to intrusion detection: a review. In: Proceedings of the 8th Wseas International Conference on Telecommunications and Informatics, Istanbul, Turkey (2009)
Kabiri, P., Ghorbani, A.A.: Research on intrusion detection and response: A survey. International Journal of Network Security 1(2), 84–102 (2005)
Mitrokotsa, A., Douligeris, C.: Detecting denial of service attacks using emergent self-organizing maps. In: Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology 2005, pp. 375–380 (2005)
Yuxin, W., Muqing, W.: Intrusion detection technology based on CEGA-SVM. In: Third International Conference on Security and Privacy in Communications Networks and the Workshops, SecureComm 2007, pp. 244–249 (2007)
Denning, D.E.: An Intrusion-Detection Model. IEEE Trans. Softw. Eng. 13(2), 222–232 (1987)
Anderson, J.P.: Computer security threat monitoring and surveillance. Technical Report. pp. 1–56. Ford Washington PA (1980)
Ahmad, I., Abdullah, A.B., Alghamdi, A.S.: Application of artificial neural network in detection of DOS attacks. In: Proceedings of the 2nd International Conference on Security of Information and Networks, Famagusta, North Cyprus (2009)
Zhu, G., Liao, J.: Research of Intrusion Detection Based on Support Vector Machine. In: International Conference on Advanced Computer Theory and Engineering, pp. 434–438 (2008)
Vladimir, V.N.: The Nature of Statistical Learning Theory. Springer, Heidelberg (1995)
Xiao, H., Peng, F., Wang, L., Li, H.: Ad hoc-based feature selection and support vector machine classifier for intrusion detection. In: IEEE International Conference on Grey Systems and Intelligent Services (GSIS 2007), pp. 1117–1121 (2007)
Gao, M., Tian, J., Xia, M.: Intrusion Detection Method Based on Classify Support Vector Machine. In: Proceedings of the 2009 Second International Conference on Intelligent Computation Technology and Automation, pp. 391–394 (2009)
Ahmad, I., Abdulah, A., Alghamdi, A.: Towards the Designing of a Robust Intrusion Detection System through an Optimized Advancement of Neural Networks. In: Kim, T.-h., Adeli, H. (eds.) AST/UCMA/ISA/ACN 2010. LNCS, vol. 6059, pp. 597–602. Springer, Heidelberg (2010)
Yang, M.-h., Wang, R.-c.: DDoS detection based on wavelet kernel support vector machine. The Journal of China Universities of Posts and Telecommunications 15(3), 59–63, 94 (2008)
Kumar, G., Kumar, K., Sachdeva, M.: The use of artificial intelligence based techniques for intrusion detection: a review. Artificial Intelligence Review 34(4), 369–387 (2010)
Mulay, S.A., Devale, P.R., Garje, G.V.: Intrusion Detection System Using Support Vector Machine and Decision Tree. International Journal of Computer Applications 3(3), 40–43 (2010)
Li, C.-C., Guo, A.-l., Li, D.: Combined Kernel SVM and Its Application on Network Security Risk Evaluation. In: International Symposium on Intelligent Information Technology Application Workshops (IITAW 2008), pp. 36–39 (2008)
Jiancheng, S.: Fast tuning of SVM kernel parameter using distance between two classes. In: 3rd International Conference on Intelligent System and Knowledge Engineering (ISKE 2008), pp. 108–113 (2008)
Broomhead, D.S., Lowe, D.: Multivariable Functional Interpolation and Adaptive Networks. Complex Systems 2, 321–355 (1988)
Yuan, J., Li, H., Ding, S., Cao, L.: Intrusion Detection Model Based on Improved Support Vector Machine. In: Proceedings of the 2010 Third International Symposium on Intelligent Information Technology and Security Informatics, pp. 465–469 (2010)
Yendrapalli, K., Mukkamala, S., Sung, A.H., Ribeiro, B.: Biased Support Vector Machines and Kernel Methods for Intrusion Detection. In: Proceedings of the World Congress on Engineering (WCE 2007), London, U.K (2007)
Yuancheng, L., Zhongqiang, W., Yinglong, M.: An intrusion detection method based on KICA and SVM. In: 7th World Congress on Intelligent Control and Automation (WCICA 2008), pp. 2141–2144 (2008)
Yuan, R., Li, Z., Guan, X., Xu, L.: An SVM-based machine learning method for accurate internet traffic classification. Information Systems Frontiers 12(2), 149–156 (2010)
Zaman, S., Karray, F.: Features Selection for Intrusion Detection Systems Based on Support Vector Machines. In: 6th IEEE Consumer Communications and Networking Conference (CCNC 2009), pp. 1–8 (2009)
Rung-Ching, C., Kai-Fan, C., Ying-Hao, C., Chia-Fen, H.: Using Rough Set and Support Vector Machine for Network Intrusion Detection System. In: First Asian Conference on Intelligent Information and Database Systems (ACIIDS 2009), pp. 465–470 (2009)
Chen, R.C., Chen, S.P.: Intrusion Detection Using a Hybrid Support Vector Machine Based on Entropy and TF-IDF. International Journal of Innovative Computing, Information and Control (IJICIC) 4(2), 413–424 (2008)
Guan, X., Guo, H., Chen, L.: Network intrusion detection method based on Agent and SVM. In: The 2nd IEEE International Conference on Information Management and Engineering (ICIME), pp. 399–402 (2010)
Xiaomei, Y., Peng, W.: Security audit system using Adaptive Genetic Algorithm and Support Vector Machine. In: 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), pp. 265–268 (2010)
Ahmad, I., Abdullah, A.B., Alghamdi, A.S., Hussain, M.: Distributed Denial of Service attack detection using Support Vector Machine. Journal of Formation-Tokyo, 127–134 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kausar, N., Belhaouari Samir, B., Abdullah, A., Ahmad, I., Hussain, M. (2011). A Review of Classification Approaches Using Support Vector Machine in Intrusion Detection. In: Abd Manaf, A., Sahibuddin, S., Ahmad, R., Mohd Daud, S., El-Qawasmeh, E. (eds) Informatics Engineering and Information Science. ICIEIS 2011. Communications in Computer and Information Science, vol 253. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25462-8_3
Download citation
DOI: https://doi.org/10.1007/978-3-642-25462-8_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25461-1
Online ISBN: 978-3-642-25462-8
eBook Packages: Computer ScienceComputer Science (R0)