Intrusion detection technique by using k-means, fuzzy neural network and SVM classifiers

With the impending era of internet, the network security has become the key foundation for lot of financial and business web applications. Intrusion detection is one of the looms to resolve the problem of network security. Imperfectness of intrusion detection systems (IDS) has given an opportunity f...

Full description

Saved in:
Bibliographic Details
Published in2013 International Conference on Computer Communication and Informatics pp. 1 - 7
Main Authors Chandrasekhar, A. M., Raghuveer, K.
Format Conference Proceeding Journal Article
LanguageEnglish
Published IEEE 01.01.2013
Subjects
Online AccessGet full text
ISBN1467329061
9781467329064
DOI10.1109/ICCCI.2013.6466310

Cover

Abstract With the impending era of internet, the network security has become the key foundation for lot of financial and business web applications. Intrusion detection is one of the looms to resolve the problem of network security. Imperfectness of intrusion detection systems (IDS) has given an opportunity for data mining to make several important contributions to the field of intrusion detection. In recent years, many researchers are using data mining techniques for building IDS. Here, we propose a new approach by utilizing data mining techniques such as neuro-fuzzy and radial basis support vector machine (SVM) for helping IDS to attain higher detection rate. The proposed technique has four major steps: primarily, k-means clustering is used to generate different training subsets. Then, based on the obtained training subsets, different neuro-fuzzy models are trained. Subsequently, a vector for SVM classification is formed and in the end, classification using radial SVM is performed to detect intrusion has happened or not. To illustrate the applicability and capability of the new approach, the results of experiments on KDD CUP 1999 dataset is demonstrated. Experimental results shows that our proposed new approach do better than BPNN, multiclass SVM and other well-known methods such as decision trees and Columbia model in terms of sensitivity, specificity and in particular detection accuracy.
AbstractList With the impending era of internet, the network security has become the key foundation for lot of financial and business web applications. Intrusion detection is one of the looms to resolve the problem of network security. Imperfectness of intrusion detection systems (IDS) has given an opportunity for data mining to make several important contributions to the field of intrusion detection. In recent years, many researchers are using data mining techniques for building IDS. Here, we propose a new approach by utilizing data mining techniques such as neuro-fuzzy and radial basis support vector machine (SVM) for helping IDS to attain higher detection rate. The proposed technique has four major steps: primarily, k-means clustering is used to generate different training subsets. Then, based on the obtained training subsets, different neuro-fuzzy models are trained. Subsequently, a vector for SVM classification is formed and in the end, classification using radial SVM is performed to detect intrusion has happened or not. To illustrate the applicability and capability of the new approach, the results of experiments on KDD CUP 1999 dataset is demonstrated. Experimental results shows that our proposed new approach do better than BPNN, multiclass SVM and other well-known methods such as decision trees and Columbia model in terms of sensitivity, specificity and in particular detection accuracy.
Author Raghuveer, K.
Chandrasekhar, A. M.
Author_xml – sequence: 1
  givenname: A. M.
  surname: Chandrasekhar
  fullname: Chandrasekhar, A. M.
  email: amblechandru@gamil.com
  organization: Dept. of Comput. Sci. & Eng., Sri Jayachamarajendra Coll. of Eng. (SJCE), Mysore, India
– sequence: 2
  givenname: K.
  surname: Raghuveer
  fullname: Raghuveer, K.
  email: raghunie@yahoo.com
  organization: Dept. of Inf. Sci., Nat. Inst. of Eng. (NIE), Mysore, India
BookMark eNqNkMtOwzAQRY0ACVr6A7DxkgUpfiSxs0QRj0hFLHiIXeQ4YzBNHbATofbrMWrZszozmjujO3eCDlzvAKFTSuaUkuKyKsuymjNC-TxP85xTsodmhZA0zQVnBRF0H03-mpweoVkIH4SQuJwzRo7Ra-UGPwbbO9zCAHr4rSLfnf0aATdrHIfuDS-TFSgXLrAZN5s1djB61UUM371fYuVa_Phyj3WnQrDGgg8n6NCoLsBsxyl6vrl-Ku-SxcNtVV4tEstSOiStEjw1QmtFUiqbNmMtb7gQpuAgSMZUC5qLXDaZBEq4KahpM60YlYYarSWfovPt3U_fR8dhqFc2aOg65aAfQ00lj8_zmM4_pISkvJAZj9KzrdQCQP3p7Ur5db2LmP8A16RxXg
ContentType Conference Proceeding
Journal Article
DBID 6IE
6IL
CBEJK
RIE
RIL
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
7QO
FR3
P64
DOI 10.1109/ICCCI.2013.6466310
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Biotechnology Research Abstracts
Engineering Research Database
Biotechnology and BioEngineering Abstracts
DatabaseTitle Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
Engineering Research Database
Biotechnology Research Abstracts
Biotechnology and BioEngineering Abstracts
DatabaseTitleList
Technology Research Database
Engineering Research Database
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781467329071
1467329053
9781467329057
146732907X
EndPage 7
ExternalDocumentID 6466310
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AAWTH
ADFMO
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IEGSK
IERZE
OCL
RIE
RIL
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
7QO
FR3
P64
ID FETCH-LOGICAL-i241t-da734f7cca0418bd52d3b377f93e7052adec3768b58e103f91fd5ca218f1fcc83
IEDL.DBID RIE
ISBN 1467329061
9781467329064
IngestDate Fri Jul 11 08:39:34 EDT 2025
Fri Jul 11 11:45:28 EDT 2025
Wed Aug 27 04:54:27 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i241t-da734f7cca0418bd52d3b377f93e7052adec3768b58e103f91fd5ca218f1fcc83
Notes ObjectType-Article-2
SourceType-Scholarly Journals-1
ObjectType-Conference-1
ObjectType-Feature-3
content type line 23
SourceType-Conference Papers & Proceedings-2
PQID 1800439853
PQPubID 23500
PageCount 7
ParticipantIDs proquest_miscellaneous_1837323646
ieee_primary_6466310
proquest_miscellaneous_1800439853
PublicationCentury 2000
PublicationDate 2013-Jan.
20130101
PublicationDateYYYYMMDD 2013-01-01
PublicationDate_xml – month: 01
  year: 2013
  text: 2013-Jan.
PublicationDecade 2010
PublicationTitle 2013 International Conference on Computer Communication and Informatics
PublicationTitleAbbrev ICCCI
PublicationYear 2013
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0001106220
Score 1.625787
Snippet With the impending era of internet, the network security has become the key foundation for lot of financial and business web applications. Intrusion detection...
SourceID proquest
ieee
SourceType Aggregation Database
Publisher
StartPage 1
SubjectTerms Artificial neural networks
Computer information security
Data mining
Fuzzy logic
Intrusion
Intrusion Detection System
K-means Clustering
Networks
Neuro-fuzzy
Radial Support Vector Machine
Support vector machines
Training
Title Intrusion detection technique by using k-means, fuzzy neural network and SVM classifiers
URI https://ieeexplore.ieee.org/document/6466310
https://www.proquest.com/docview/1800439853
https://www.proquest.com/docview/1837323646
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEF5qT55UWrG-WMFjk2azeeyeg6UVKoJWeivZl5RqKpgc2l_v7DZpQUU8JYEwJDObncnu932D0C18ZVoEyniUm8iLDE88kYQW_ySJEsTKgziU70Mymkb3s3jWQv0dF0Zr7cBn2renbi9frWRll8oGSQT50fKpDmCYbbla-_UU-LcJw8Bxt5KUWhVz0kg61ddRQ5oJ-GCcZdnYIruoX1ut26v8mJNdohkeoUnziFt8ydKvSuHLzTf1xv--wzHq7il9-HGXrE5QSxcdNBsXlnMBocFKlw6UVeCdqisWa2xh8a946b1rSGl9bKrNZo2tBmb-BgeHIMd5ofDTywRLW4gvjO2t3UXT4d1zNvLqVgveAlJ46ak8pZFJIZxBRJhQcaiooGlqONVpEIe50hKmIiZipklADSdGxTKH-sAQIyWjp6hdrAp9hjD8QqWUUJgYIPqMSSYol0FiAiYTDmZ7qGO9Mv_YqmnMa4f00E3j9zmMcLttkRd6VX3OCbPblRzqir_uoRBjCrbOfzd_gQ5D18jCLp5cojZ4V19BOVGKazeOvgBHzcXW
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEF5KPehJpRXrcwWPTZrN5rE5F0ujbRFspbeQfUlRU8Hm0P56Z7dpCyriKQmEIZnZ7Ex2v-8bhG7hK1Pck9qhiQ6cQCeRwyPf4J8EkZwYeRCL8h1F_UlwPw2nNdTecmGUUhZ8plxzavfy5VyUZqmsEwWQHw2fag_yfhCu2Vq7FRX4u_F9z7K3opgaHXOyEXWqroMNbcZLOmm3200Ntou6ld2qwcqPWdmmmt4hGm4eco0weXXLBXfF6pt-43_f4gg1d6Q-_LhNV8eopooGmqaFYV1AcLBUCwvLKvBW1xXzJTbA-Bf86rwrSGptrMvVaomNCmb-BgeLIcd5IfHT8xALU4rPtOmu3UST3t2423eqZgvODJL4wpF5TAMdQ0C9gDAuQ19STuNYJ1TFXujnUgmYjBgPmSIe1QnRMhQ5VAiaaCEYPUH1Yl6oU4ThJyqmhMLUAPFnTDBOE-FF2mMiSsBsCzWMV7KPtZ5GVjmkhW42fs9gjJuNi7xQ8_IzI8xsWCZQWfx1D4UYU7B19rv5a7TfHw8H2SAdPZyjA9-2tTBLKReoDp5Wl1BcLPiVHVNf0TzJIw
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2013+International+Conference+on+Computer+Communication+and+Informatics&rft.atitle=Intrusion+detection+technique+by+using+k-means%2C+fuzzy+neural+network+and+SVM+classifiers&rft.au=Chandrasekhar%2C+A.+M.&rft.au=Raghuveer%2C+K.&rft.date=2013-01-01&rft.pub=IEEE&rft.isbn=9781467329064&rft.spage=1&rft.epage=7&rft_id=info:doi/10.1109%2FICCCI.2013.6466310&rft.externalDocID=6466310
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467329064/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467329064/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467329064/sc.gif&client=summon&freeimage=true