Browse > Article
http://dx.doi.org/10.17661/jkiiect.2017.10.1.38

A Study on Developing Intrusion Detection System Using APEX : A Collaborative Research Project with Jade Solution Company  

Kim, Byung-Joo (Department of Computer Engineering, Youngsan University)
Publication Information
The Journal of Korea Institute of Information, Electronics, and Communication Technology / v.10, no.1, 2017 , pp. 38-45 More about this Journal
Abstract
Attacking of computer and network is increasing as information processing technology heavily depends on computer and network. To prevent the attack of system and network, host and network based intrusion detection system has developed. But previous rule based system has a lot of difficulties. For this reason demand for developing a intrusion detection system which detects and cope with the attack of system and network resource in real time. In this paper we develop a real time intrusion detection system which is combination of APEX and LS-SVM classifier. Proposed system is for nonlinear data and guarantees convergence. While real time processing system has its advantages, such as memory efficiency and allowing a new training data, it also has its disadvantages of inaccuracy compared to batch way. Therefore proposed real time intrusion detection system shows similar performance in accuracy compared to batch way intrusion detection system, it can be deployed on a commercial scale.
Keywords
APEX; KDD CUP 99; real time intrusion detection system; incremental LS-SVM; commercial scale;
Citations & Related Records
연도 인용수 순위
  • Reference
1 A.H. Sung, S. Mukkamala, "Identifying Important Features for Intrusion Detection Using Support Vector Machines and Neural Networks" Proceedings of the 2003 Symposium on Applications and the Internet, 2003.
2 Nong Ye, "A Scalable Clustering Technique for Intrusion Signature Recognition," Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, 2001.
3 P. Hall, D. Marshall, R. Martin., "Incremental eigenalysis for classification", In British Machine Vision Conference, Vol. 1, pp. 286-295, 1998.
4 H. Chen, R.-W. Liu, "Adaptive distributed orthogonalization processing for principal components analysis", Acoustics Speech and Signal Processing, Vol. 2, pp. 293-296, 1992.
5 J. A. K Suykens, J. Vandewalle : "Multiclass Least Squares Support Vector Machines", Proc. International Joint Conference on Neural Networks, Washington DC, 1999.
6 MU Xin-guo, Hao Wen-ning, Zaho En-Lai, Chen Gang "An incremental LS-SVM learning algorithm ILS-SVM" International Conference on E-Business and E-Government ICEE, 2011.
7 https://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
8 Yasir Hamid, M Sugumaran, Ludovic Journaux " Machine Learning Techniques for Intrusion Detection : A Comparative Analysis", International Conference on Informatics and Analytics ICIA 2016, 2016.
9 Mahdi Zamani "Machine Learning Techniques for Intrusion Detection" arXiv, 2013.