基于sne -小波-支持向量机的网络入侵检测

Yasir Hamid, Ludovic Journax, F. Shah, M. Sugumaran
{"title":"基于sne -小波-支持向量机的网络入侵检测","authors":"Yasir Hamid, Ludovic Journax, F. Shah, M. Sugumaran","doi":"10.14257/IJSIA.2017.11.5.01","DOIUrl":null,"url":null,"abstract":"Recognizing intrusions quickly and precisely is vital to the proficient operation of computer networks. Precisely describing critical classes of intrusions extraordinarily encourages their recognizable proof; be that as it may, the nuances and complexities of anomalous activities can without much of a stretch complicate the procedure. Due to the inherent capability of the signal processing to discover the novel and obscure attacks, they have been pretty popular for Network Intrusion Detection, and the nearness of the self-comparability in the system activity propels the appropriateness for the application Wavelets. In this work we first subject the network data to dimension reduction using Stochastic Neighbor Embedding (SNE) and then preform the wavelet decomposition of the data. The classification results of the pre-processed data using Gaussian SVM over different bandwidths uphold the claim that the proposed system has appreciably improved detection coverage for all the attack groups and the normal data as well, and at the same time minimized the false alarms. (Coiflets), Biorthogonal wavelets, Harmonic wavelets, Legendre wavelets, M-band wavelets and Composite wavelets.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2017-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Coalesce of SNE-Wavelet-SVM Technique for Network Intrusion Detection\",\"authors\":\"Yasir Hamid, Ludovic Journax, F. Shah, M. Sugumaran\",\"doi\":\"10.14257/IJSIA.2017.11.5.01\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recognizing intrusions quickly and precisely is vital to the proficient operation of computer networks. Precisely describing critical classes of intrusions extraordinarily encourages their recognizable proof; be that as it may, the nuances and complexities of anomalous activities can without much of a stretch complicate the procedure. Due to the inherent capability of the signal processing to discover the novel and obscure attacks, they have been pretty popular for Network Intrusion Detection, and the nearness of the self-comparability in the system activity propels the appropriateness for the application Wavelets. In this work we first subject the network data to dimension reduction using Stochastic Neighbor Embedding (SNE) and then preform the wavelet decomposition of the data. The classification results of the pre-processed data using Gaussian SVM over different bandwidths uphold the claim that the proposed system has appreciably improved detection coverage for all the attack groups and the normal data as well, and at the same time minimized the false alarms. (Coiflets), Biorthogonal wavelets, Harmonic wavelets, Legendre wavelets, M-band wavelets and Composite wavelets.\",\"PeriodicalId\":46187,\"journal\":{\"name\":\"International Journal of Security and Its Applications\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-05-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Security and Its Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.14257/IJSIA.2017.11.5.01\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Security and Its Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14257/IJSIA.2017.11.5.01","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

快速准确地识别入侵对于熟练操作计算机网络至关重要。准确地描述入侵的关键类别,极大地鼓励了它们的可识别证据;尽管如此,异常活动的细微差别和复杂性可能会使程序复杂化。由于信号处理发现新颖和模糊攻击的固有能力,它们在网络入侵检测中非常流行,而系统活动中自相似性的接近性推动了应用Wavelets的适当性。在这项工作中,我们首先使用随机邻居嵌入(SNE)对网络数据进行降维,然后对数据进行小波分解。使用高斯SVM在不同带宽上对预处理数据的分类结果支持这样的说法,即所提出的系统显著提高了对所有攻击组和正常数据的检测覆盖率,同时最大限度地减少了误报。(Coiflets)、双正交小波、谐波小波、勒让德小波、M-带小波和复合小波。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Coalesce of SNE-Wavelet-SVM Technique for Network Intrusion Detection
Recognizing intrusions quickly and precisely is vital to the proficient operation of computer networks. Precisely describing critical classes of intrusions extraordinarily encourages their recognizable proof; be that as it may, the nuances and complexities of anomalous activities can without much of a stretch complicate the procedure. Due to the inherent capability of the signal processing to discover the novel and obscure attacks, they have been pretty popular for Network Intrusion Detection, and the nearness of the self-comparability in the system activity propels the appropriateness for the application Wavelets. In this work we first subject the network data to dimension reduction using Stochastic Neighbor Embedding (SNE) and then preform the wavelet decomposition of the data. The classification results of the pre-processed data using Gaussian SVM over different bandwidths uphold the claim that the proposed system has appreciably improved detection coverage for all the attack groups and the normal data as well, and at the same time minimized the false alarms. (Coiflets), Biorthogonal wavelets, Harmonic wavelets, Legendre wavelets, M-band wavelets and Composite wavelets.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
International Journal of Security and Its Applications
International Journal of Security and Its Applications COMPUTER SCIENCE, INFORMATION SYSTEMS-
自引率
0.00%
发文量
0
期刊介绍: IJSIA aims to facilitate and support research related to security technology and its applications. Our Journal provides a chance for academic and industry professionals to discuss recent progress in the area of security technology and its applications. Journal Topics: -Access Control -Ad Hoc & Sensor Network Security -Applied Cryptography -Authentication and Non-repudiation -Cryptographic Protocols -Denial of Service -E-Commerce Security -Identity and Trust Management -Information Hiding -Insider Threats and Countermeasures -Intrusion Detection & Prevention -Network & Wireless Security -Peer-to-Peer Security -Privacy and Anonymity -Secure installation, generation and operation -Security Analysis Methodologies -Security assurance -Security in Software Outsourcing -Security products or systems -Security technology -Systems and Data Security
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信