Skip to main content

Building an Intrusion Detection System Based on Support Vector Machine and Genetic Algorithm

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3498))

Abstract

Host-based Intrusion Detection System (IDS) utilizes the log files as the data source and is limited by the content of the log files. If the log files were tampered, the IDS cannot accurately detect illegal behaviors. Therefore, the proposed IDS for this paper will create its own data source file. The system is controlled by the Client program and Server program. The client program is responsible for recording a user’s behavior in the data source file. The data source file is then transmitted to the server program, which will send it to SVM to be analyzed. The analyzed result will then be transmitted back to the client program. The client program will then decide on the course of actions to take based on the analyzed result. Also, the genetic algorithm is used to optimize information to extract from the data source file so that detection time can be optimized.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Denning, D.E.: An Intrusion Detection Model. IEEE Trans. Soft. Eng. (SE-13) 2, 222–232 (1987)

    Article  Google Scholar 

  2. Helmer, G., Wong, J.S.K., Honavar, V., Miller, L.: Automated Discovery of Concise Predictive Rules for Intrusion Detection. J. Sys. & Soft, 165-175 (2002)

    Google Scholar 

  3. Jha, S., Hassan, M.: Building Agents for Rule-based Intrusion Detection System. Comp. Comm, 1366-1373 (2002)

    Google Scholar 

  4. Graham, R.: (March 2000), http://www.robertgraham.com/pubs/network-intrusion-detection.html

  5. Forouzan, B.A.: TCP/IP Protocol Suite. McGraw Hill Pub., New York (2000)

    Google Scholar 

  6. Schwenker, F.: Hierarchical Support Vector Machines for Multi-Class Pattern Recognition. IEEE Knowl.-Based Intel. Eng. Sys. & Allied Tech. 2, 561–565 (2000)

    Google Scholar 

  7. Hsu, C.W., Lin, C.J.: A Comparison of Methods for Multi-Class Support Vector Machines. IEEE Trans, Neural Networks 2, 415–425 (2002)

    Google Scholar 

  8. http://www.csie.ntu.edu.tw/~cjlin/libsvm/

  9. Michalski, R.S., Bratko, I., Kubat, M.: Machine Learning and Data Mining: Methods and Applications. Wiley Pub., Chichester (1998)

    Google Scholar 

  10. Man, K.F., Tang, K.S., Kwong, S.: Genetic Algorithms – Concepts and Design, pp. 1–30. Springer, Heidelberg (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chen, R., Chen, J., Chen, T., Hsieh, C., Chen, T., Wu, K. (2005). Building an Intrusion Detection System Based on Support Vector Machine and Genetic Algorithm. In: Wang, J., Liao, XF., Yi, Z. (eds) Advances in Neural Networks – ISNN 2005. ISNN 2005. Lecture Notes in Computer Science, vol 3498. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11427469_66

Download citation

  • DOI: https://doi.org/10.1007/11427469_66

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25914-5

  • Online ISBN: 978-3-540-32069-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics