Skip to main content

Machine Learning Approach to Realtime Intrusion Detection System

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3809))

Abstract

Computer security has become a critical issue with the rapid development of business and other transaction systems over the internet. Recently applying artificial intelligence, machine learning and data mining techniques to intrusion detection system are increasing. But most of researches are focused on improving the classification performance of classifier. Selecting important features from input data lead to a simplification of the problem, faster and more accurate detection rates. Thus selecting important features is an important issue in intrusion detection. Another issue in intrusion detection is that most of the intrusion detection systems are performed by off-line and it is not proper method for realtime intrusion detection system. In this paper, we develop the realtime intrusion detection system which combining on-line feature extraction method with Least Squares Support Vector Machine classifier. Applying proposed system to KDD CUP 99 data, experimental results show that it have remarkable feature feature extraction and classification performance compared to existing off-line intrusion detection system.

This study was supported by a grant of the Korea Health 21 R&D Project, Ministry of Health & Welfare, Republic of Korea (02-PJ1-PG6-HI03-0004).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   189.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Eskin, E.: Anomaly detection over noisy data using learned probability distribution. In: Proceedings of the Seventeenth International Conference on Machine Learning, pp. 443–482 (2000)

    Google Scholar 

  2. Ghosh, A., Schwartzbard, A.: A Study in using neural networks for anomaly and misuse detection. In: Proceedings of the Eighth USENIX Security Symposium, pp. 443–482 (1999)

    Google Scholar 

  3. Lee, W., Stolfo, S.J., Mok, K.: A Data mining in workflow environments.:Experience in intrusion detection. In: Proceedings of the 1999 Conference on Knowledge Discovery and Data Mining (1999)

    Google Scholar 

  4. Tipping, M.E., Bishop, C.M.: Mixtures of probabilistic principal component analysers. Neural Computation 11(2), 443–482 (1998)

    Article  Google Scholar 

  5. Kramer, M.A.: Nonlinear principal component analysis using autoassociative neural networks. AICHE Journal 37(2), 233–243 (1991)

    Article  Google Scholar 

  6. Diamantaras, K.I., Kung, S.Y.: Principal Component Neural Networks: Theory and Applications. John Wiley & Sons, Inc, New York (1996)

    MATH  Google Scholar 

  7. Kim, B.J., Shim, J.Y., Hwang, C.H., Kim, I.K.: On-line Feature Extraction Based on Emperical Feature Map. In: Foundations of Intelligent Systems. LNCS (LNAI), vol. 2871, pp. 440–444. Springer, Heidelberg (2003)

    Google Scholar 

  8. Softky, W.S., Kammen, D.M.: Correlation in high dimensional or asymmetric data set: Hebbian neuronal processing. Neural Networks 4, 337–348 (1991)

    Article  Google Scholar 

  9. Gupta, H., Agrawal, A.K., Pruthi, T., Shekhar, C., Chellappa., R.: An Experimental Evaluation of Linear and Kernel-Based Methods for Face Recognition, accessible at, http://citeseer.nj.nec.com

  10. Suykens, J.A.K., Vandewalle, J.: Least squares support vector machine classifiers. Neural Processing Letters 9, 293–300 (1999)

    Article  MathSciNet  Google Scholar 

  11. Vapnik, V.N.: Statistical learning theory. John Wiley & Sons, New York (1998)

    MATH  Google Scholar 

  12. Hall, P., Marshall, D., Martin, R.: On-line eigenalysis for classification. In: British Machine Vision Conference, vol. 1, pp. 286–295 (1998)

    Google Scholar 

  13. Winkeler, J., Manjunath, B.S., Chandrasekaran, S.: Subset selection for active object recognition. In: CVPR, vol. 2, pp. 511–516. IEEE Computer Society Press, Los Alamitos (1999)

    Google Scholar 

  14. Murakami, H., Kumar., B.V.K.V.: Efficient calculation of primary images from a set of images. IEEE PAMI 4(5), 511–515 (1982)

    Google Scholar 

  15. Scholkopf, B., Smola, A., Muller, K.R.: Nonlinear component analysis as a kernel eigenvalue problem. Neural Computation 10(5), 1299–1319 (1998)

    Article  Google Scholar 

  16. Tsuda, K.: Support vector classifier based on asymmetric kernel function. In: Proc. ESANN (1999)

    Google Scholar 

  17. Mika, S.: Kernel algorithms for nonlinear signal processing in feature spaces. Master’s thesis, Technical University of Berlin (November 1998)

    Google Scholar 

  18. Accessable at, http://kdd.ics.uci.edu/databases/kddcup99

  19. Gestel, V., Suykens, T.J.A.K., Lanckriet, G., Lambrechts, De Moor, A.B., Vandewalle, J.: A Bayesian Framework for Least Squares Support Vector Machine Classifiers. Internal Report 00-65, ESAT-SISTA, K.U. Leuven

    Google Scholar 

  20. Suykens, J.A.K., Vandewalle, J.: Multiclass Least Squares Support Vector Machines. In: Proc. International Joint Conference on Neural Networks (IJCNN 1999), Washington DC (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, BJ., Kim, I.K. (2005). Machine Learning Approach to Realtime Intrusion Detection System. In: Zhang, S., Jarvis, R. (eds) AI 2005: Advances in Artificial Intelligence. AI 2005. Lecture Notes in Computer Science(), vol 3809. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11589990_18

Download citation

  • DOI: https://doi.org/10.1007/11589990_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30462-3

  • Online ISBN: 978-3-540-31652-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics