Intrusion detection technique by using k-means, fuzzy neural network and SVM classifiers
With the impending era of internet, the network security has become the key foundation for lot of financial and business web applications. Intrusion detection is one of the looms to resolve the problem of network security. Imperfectness of intrusion detection systems (IDS) has given an opportunity f...
Saved in:
Published in | 2013 International Conference on Computer Communication and Informatics pp. 1 - 7 |
---|---|
Main Authors | , |
Format | Conference Proceeding Journal Article |
Language | English |
Published |
IEEE
01.01.2013
|
Subjects | |
Online Access | Get full text |
ISBN | 1467329061 9781467329064 |
DOI | 10.1109/ICCCI.2013.6466310 |
Cover
Abstract | With the impending era of internet, the network security has become the key foundation for lot of financial and business web applications. Intrusion detection is one of the looms to resolve the problem of network security. Imperfectness of intrusion detection systems (IDS) has given an opportunity for data mining to make several important contributions to the field of intrusion detection. In recent years, many researchers are using data mining techniques for building IDS. Here, we propose a new approach by utilizing data mining techniques such as neuro-fuzzy and radial basis support vector machine (SVM) for helping IDS to attain higher detection rate. The proposed technique has four major steps: primarily, k-means clustering is used to generate different training subsets. Then, based on the obtained training subsets, different neuro-fuzzy models are trained. Subsequently, a vector for SVM classification is formed and in the end, classification using radial SVM is performed to detect intrusion has happened or not. To illustrate the applicability and capability of the new approach, the results of experiments on KDD CUP 1999 dataset is demonstrated. Experimental results shows that our proposed new approach do better than BPNN, multiclass SVM and other well-known methods such as decision trees and Columbia model in terms of sensitivity, specificity and in particular detection accuracy. |
---|---|
AbstractList | With the impending era of internet, the network security has become the key foundation for lot of financial and business web applications. Intrusion detection is one of the looms to resolve the problem of network security. Imperfectness of intrusion detection systems (IDS) has given an opportunity for data mining to make several important contributions to the field of intrusion detection. In recent years, many researchers are using data mining techniques for building IDS. Here, we propose a new approach by utilizing data mining techniques such as neuro-fuzzy and radial basis support vector machine (SVM) for helping IDS to attain higher detection rate. The proposed technique has four major steps: primarily, k-means clustering is used to generate different training subsets. Then, based on the obtained training subsets, different neuro-fuzzy models are trained. Subsequently, a vector for SVM classification is formed and in the end, classification using radial SVM is performed to detect intrusion has happened or not. To illustrate the applicability and capability of the new approach, the results of experiments on KDD CUP 1999 dataset is demonstrated. Experimental results shows that our proposed new approach do better than BPNN, multiclass SVM and other well-known methods such as decision trees and Columbia model in terms of sensitivity, specificity and in particular detection accuracy. |
Author | Raghuveer, K. Chandrasekhar, A. M. |
Author_xml | – sequence: 1 givenname: A. M. surname: Chandrasekhar fullname: Chandrasekhar, A. M. email: amblechandru@gamil.com organization: Dept. of Comput. Sci. & Eng., Sri Jayachamarajendra Coll. of Eng. (SJCE), Mysore, India – sequence: 2 givenname: K. surname: Raghuveer fullname: Raghuveer, K. email: raghunie@yahoo.com organization: Dept. of Inf. Sci., Nat. Inst. of Eng. (NIE), Mysore, India |
BookMark | eNqNkMtOwzAQRY0ACVr6A7DxkgUpfiSxs0QRj0hFLHiIXeQ4YzBNHbATofbrMWrZszozmjujO3eCDlzvAKFTSuaUkuKyKsuymjNC-TxP85xTsodmhZA0zQVnBRF0H03-mpweoVkIH4SQuJwzRo7Ra-UGPwbbO9zCAHr4rSLfnf0aATdrHIfuDS-TFSgXLrAZN5s1djB61UUM371fYuVa_Phyj3WnQrDGgg8n6NCoLsBsxyl6vrl-Ku-SxcNtVV4tEstSOiStEjw1QmtFUiqbNmMtb7gQpuAgSMZUC5qLXDaZBEq4KahpM60YlYYarSWfovPt3U_fR8dhqFc2aOg65aAfQ00lj8_zmM4_pISkvJAZj9KzrdQCQP3p7Ur5db2LmP8A16RxXg |
ContentType | Conference Proceeding Journal Article |
DBID | 6IE 6IL CBEJK RIE RIL 7SC 7SP 8FD JQ2 L7M L~C L~D 7QO FR3 P64 |
DOI | 10.1109/ICCCI.2013.6466310 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Biotechnology Research Abstracts Engineering Research Database Biotechnology and BioEngineering Abstracts |
DatabaseTitle | Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional Engineering Research Database Biotechnology Research Abstracts Biotechnology and BioEngineering Abstracts |
DatabaseTitleList | Technology Research Database Engineering Research Database |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9781467329071 1467329053 9781467329057 146732907X |
EndPage | 7 |
ExternalDocumentID | 6466310 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR AAWTH ADFMO ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IEGSK IERZE OCL RIE RIL 7SC 7SP 8FD JQ2 L7M L~C L~D 7QO FR3 P64 |
ID | FETCH-LOGICAL-i241t-da734f7cca0418bd52d3b377f93e7052adec3768b58e103f91fd5ca218f1fcc83 |
IEDL.DBID | RIE |
ISBN | 1467329061 9781467329064 |
IngestDate | Fri Jul 11 08:39:34 EDT 2025 Fri Jul 11 11:45:28 EDT 2025 Wed Aug 27 04:54:27 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i241t-da734f7cca0418bd52d3b377f93e7052adec3768b58e103f91fd5ca218f1fcc83 |
Notes | ObjectType-Article-2 SourceType-Scholarly Journals-1 ObjectType-Conference-1 ObjectType-Feature-3 content type line 23 SourceType-Conference Papers & Proceedings-2 |
PQID | 1800439853 |
PQPubID | 23500 |
PageCount | 7 |
ParticipantIDs | proquest_miscellaneous_1837323646 ieee_primary_6466310 proquest_miscellaneous_1800439853 |
PublicationCentury | 2000 |
PublicationDate | 2013-Jan. 20130101 |
PublicationDateYYYYMMDD | 2013-01-01 |
PublicationDate_xml | – month: 01 year: 2013 text: 2013-Jan. |
PublicationDecade | 2010 |
PublicationTitle | 2013 International Conference on Computer Communication and Informatics |
PublicationTitleAbbrev | ICCCI |
PublicationYear | 2013 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0001106220 |
Score | 1.625787 |
Snippet | With the impending era of internet, the network security has become the key foundation for lot of financial and business web applications. Intrusion detection... |
SourceID | proquest ieee |
SourceType | Aggregation Database Publisher |
StartPage | 1 |
SubjectTerms | Artificial neural networks Computer information security Data mining Fuzzy logic Intrusion Intrusion Detection System K-means Clustering Networks Neuro-fuzzy Radial Support Vector Machine Support vector machines Training |
Title | Intrusion detection technique by using k-means, fuzzy neural network and SVM classifiers |
URI | https://ieeexplore.ieee.org/document/6466310 https://www.proquest.com/docview/1800439853 https://www.proquest.com/docview/1837323646 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEF5qT55UWrG-WMFjk2azeeyeg6UVKoJWeivZl5RqKpgc2l_v7DZpQUU8JYEwJDObncnu932D0C18ZVoEyniUm8iLDE88kYQW_ySJEsTKgziU70Mymkb3s3jWQv0dF0Zr7cBn2renbi9frWRll8oGSQT50fKpDmCYbbla-_UU-LcJw8Bxt5KUWhVz0kg61ddRQ5oJ-GCcZdnYIruoX1ut26v8mJNdohkeoUnziFt8ydKvSuHLzTf1xv--wzHq7il9-HGXrE5QSxcdNBsXlnMBocFKlw6UVeCdqisWa2xh8a946b1rSGl9bKrNZo2tBmb-BgeHIMd5ofDTywRLW4gvjO2t3UXT4d1zNvLqVgveAlJ46ak8pZFJIZxBRJhQcaiooGlqONVpEIe50hKmIiZipklADSdGxTKH-sAQIyWjp6hdrAp9hjD8QqWUUJgYIPqMSSYol0FiAiYTDmZ7qGO9Mv_YqmnMa4f00E3j9zmMcLttkRd6VX3OCbPblRzqir_uoRBjCrbOfzd_gQ5D18jCLp5cojZ4V19BOVGKazeOvgBHzcXW |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEF5KPehJpRXrcwWPTZrN5rE5F0ujbRFspbeQfUlRU8Hm0P56Z7dpCyriKQmEIZnZ7Ex2v-8bhG7hK1Pck9qhiQ6cQCeRwyPf4J8EkZwYeRCL8h1F_UlwPw2nNdTecmGUUhZ8plxzavfy5VyUZqmsEwWQHw2fag_yfhCu2Vq7FRX4u_F9z7K3opgaHXOyEXWqroMNbcZLOmm3200Ntou6ld2qwcqPWdmmmt4hGm4eco0weXXLBXfF6pt-43_f4gg1d6Q-_LhNV8eopooGmqaFYV1AcLBUCwvLKvBW1xXzJTbA-Bf86rwrSGptrMvVaomNCmb-BgeLIcd5IfHT8xALU4rPtOmu3UST3t2423eqZgvODJL4wpF5TAMdQ0C9gDAuQ19STuNYJ1TFXujnUgmYjBgPmSIe1QnRMhQ5VAiaaCEYPUH1Yl6oU4ThJyqmhMLUAPFnTDBOE-FF2mMiSsBsCzWMV7KPtZ5GVjmkhW42fs9gjJuNi7xQ8_IzI8xsWCZQWfx1D4UYU7B19rv5a7TfHw8H2SAdPZyjA9-2tTBLKReoDp5Wl1BcLPiVHVNf0TzJIw |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2013+International+Conference+on+Computer+Communication+and+Informatics&rft.atitle=Intrusion+detection+technique+by+using+k-means%2C+fuzzy+neural+network+and+SVM+classifiers&rft.au=Chandrasekhar%2C+A.+M.&rft.au=Raghuveer%2C+K.&rft.date=2013-01-01&rft.pub=IEEE&rft.isbn=9781467329064&rft.spage=1&rft.epage=7&rft_id=info:doi/10.1109%2FICCCI.2013.6466310&rft.externalDocID=6466310 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467329064/lc.gif&client=summon&freeimage=true |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467329064/mc.gif&client=summon&freeimage=true |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467329064/sc.gif&client=summon&freeimage=true |