...
首页> 外文期刊>The VLDB journal >A new intrusion detection system using support vector machines and hierarchical clustering
【24h】

A new intrusion detection system using support vector machines and hierarchical clustering

机译:一种新的入侵检测系统,使用支持向量机和分层群集

获取原文
获取原文并翻译 | 示例

摘要

Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network services by purposely occupying or sabotaging network resources and services. This can be done by sending large amounts of network traffic, exploiting well-known faults in networking services, and by overloading network hosts. Intrusion Detection attempts to detect computer attacks by examining various data records observed in processes on the network and it is split into two groups, anomaly detection systems and misuse detection systems. Anomaly detection is an attempt to search for malicious behavior that deviates from established normal patterns. Misuse detection is used to identify intrusions that match known attack scenarios. Our interest here is in anomaly detection and our proposed method is a scalable solution for detecting network-based anomalies. We use Support Vector Machines (SVM) for classification. The SVM is one of the most successful classification algorithms in the data mining area, but its long training time limits its use. This paper presents a study for enhancing the training time of SVM, specifically when dealing with large data sets, using hierarchical clustering analysis. We use the Dynamically Growing Self-Organizing Tree (DGSOT) algorithm for clustering because it has proved to overcome the drawbacks of traditional hierarchical clustering algorithms (e.g., hierarchical agglomerative clustering). Clustering analysis helps find the boundary points, which are the most qualified data points to train SVM, between two classes. We present a new approach of combination of SVM and DGSOT, which starts with an initial training set and expands it gradually using the clustering structure produced by the DGSOT algorithm. We compare our approach with the Rocchio Bundling technique and random selection in terms of accuracy loss and training time gain using a single benchmark real data set. We show that our proposed variations contribute significantly in improving the training process ofSVM with high generalization accuracy and outperform the Rocchio Bundling technique.
机译:每当发生入侵时,计算机系统的安全性和值都会受到损害。基于网络的攻击使得合法用户难以通过故意占用或破坏网络资源和服务来访问各种网络服务。这可以通过发送大量网络流量,利用网络服务中的众所周知的故障以及通过重载网络主机来完成。通过检查网络中的过程中观察到的各种数据记录来检测计算机攻击的入侵检测尝试尝试,并且它被分成两组,异常检测系统和滥用检测系统。异常检测是试图搜索偏离既定正常模式的恶意行为。误用检测用于识别匹配已知攻击方案的入侵。我们这里的兴趣是异常检测,我们所提出的方法是用于检测基于网络的异常的可扩展解决方案。我们使用支持向量机(SVM)进行分类。 SVM是数据挖掘区域中最成功的分类算法之一,但其长期训练时间限制了其使用。本文介绍了使用分层聚类分析处理大数据集的SVM培训时间的研究。我们使用动态种植的自组织树(DGSOT)算法进行群集,因为它已经证明克服了传统分层聚类算法的缺点(例如,分层凝聚聚类)。聚类分析有助于找到边界点,这是两个类之间培训SVM的最合格的数据点。我们提出了一种新的SVM和DGSOT的组合方法,它从初始训练集开始,并使用DGSOT算法产生的聚类结构逐渐扩展。我们使用单个基准真实数据集进行比较rocchio捆绑技术和随机选择的方法。我们表明我们所提出的变化显着促进了高泛化精度的培训过程,优于Rocchio捆绑技术。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号