Abstract
Host-based Intrusion Detection System (IDS) utilizes the log files as the data source and is limited by the content of the log files. If the log files were tampered, the IDS cannot accurately detect illegal behaviors. Therefore, the proposed IDS for this paper will create its own data source file. The system is controlled by the Client program and Server program. The client program is responsible for recording a user’s behavior in the data source file. The data source file is then transmitted to the server program, which will send it to SVM to be analyzed. The analyzed result will then be transmitted back to the client program. The client program will then decide on the course of actions to take based on the analyzed result. Also, the genetic algorithm is used to optimize information to extract from the data source file so that detection time can be optimized.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Denning, D.E.: An Intrusion Detection Model. IEEE Trans. Soft. Eng. (SE-13) 2, 222–232 (1987)
Helmer, G., Wong, J.S.K., Honavar, V., Miller, L.: Automated Discovery of Concise Predictive Rules for Intrusion Detection. J. Sys. & Soft, 165-175 (2002)
Jha, S., Hassan, M.: Building Agents for Rule-based Intrusion Detection System. Comp. Comm, 1366-1373 (2002)
Graham, R.: (March 2000), http://www.robertgraham.com/pubs/network-intrusion-detection.html
Forouzan, B.A.: TCP/IP Protocol Suite. McGraw Hill Pub., New York (2000)
Schwenker, F.: Hierarchical Support Vector Machines for Multi-Class Pattern Recognition. IEEE Knowl.-Based Intel. Eng. Sys. & Allied Tech. 2, 561–565 (2000)
Hsu, C.W., Lin, C.J.: A Comparison of Methods for Multi-Class Support Vector Machines. IEEE Trans, Neural Networks 2, 415–425 (2002)
Michalski, R.S., Bratko, I., Kubat, M.: Machine Learning and Data Mining: Methods and Applications. Wiley Pub., Chichester (1998)
Man, K.F., Tang, K.S., Kwong, S.: Genetic Algorithms – Concepts and Design, pp. 1–30. Springer, Heidelberg (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chen, R., Chen, J., Chen, T., Hsieh, C., Chen, T., Wu, K. (2005). Building an Intrusion Detection System Based on Support Vector Machine and Genetic Algorithm. In: Wang, J., Liao, XF., Yi, Z. (eds) Advances in Neural Networks – ISNN 2005. ISNN 2005. Lecture Notes in Computer Science, vol 3498. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11427469_66
Download citation
DOI: https://doi.org/10.1007/11427469_66
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25914-5
Online ISBN: 978-3-540-32069-2
eBook Packages: Computer ScienceComputer Science (R0)