Application of online-training SVMs for real-time intrusion detection with different considerations

被引:55
作者
Zhang, ZH [1 ]
Shen, H [1 ]
机构
[1] Japan Adv Inst Sci & Technol, Sch Informat Sci, Ishikari, Hokkaido 9231292, Japan
关键词
computer security; intrusion detection; anomaly detection; support vector machines; text categorization;
D O I
10.1016/j.comcom.2005.01.014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As intrusion detection essentially can be formulated as a binary classification problem, it thus can be solved by an effective classification technique-Support Vector Machine (SVM). Additionally, some text processing techniques can also be employed for intrusion detection, based on the characterization of the frequencies of the system calls executed by the privileged programs. Based on the intersection of these two research domains, i.e. pattern recognition and text categorization, and breaking the strong traditional assumption that training data for intrusion detectors are readily available with high quality in batch, the conventional SVM, Robust SVM and one-class SVM have been modified respectively based on the idea from Online SVM in this paper, and their performances are compared with that of the original algorithms. After elaborate theoretical analysis, concrete experiments with 1998 DARPA BSM data set collected at MIT's Lincoln Labs are carried out. These experiments verify that the modified SVMs can be trained online and the results outperform the original ones with fewer support vectors (SVs) and less training time without decreasing detection accuracy. Both of these achievements could significantly benefit an effective online intrusion detection system. (c) 2005 Elsevier B.V. All rights reserved.
引用
收藏
页码:1428 / 1442
页数:15
相关论文
共 32 条
[1]  
[Anonymous], P 1996 IEEE S SEC PR
[2]  
[Anonymous], APPL SUPPORT VECTOR
[3]  
ASAKA M, 2001, IEICE T INFORMATION, V84
[4]  
Axelsson S., 2000, ACM Transactions on Information and Systems Security, V3, P186, DOI 10.1145/357830.357849
[5]  
BRANTS T, 2003, SYSTEM NEW EVENT DET
[6]   A tutorial on Support Vector Machines for pattern recognition [J].
Burges, CJC .
DATA MINING AND KNOWLEDGE DISCOVERY, 1998, 2 (02) :121-167
[7]   The analysis of decomposition methods for support vector machines [J].
Chang, CC ;
Hsu, CW ;
Lin, CJ .
IEEE TRANSACTIONS ON NEURAL NETWORKS, 2000, 11 (04) :1003-1008
[8]  
Dao V.N.P., 2002, Differential equations and dynamical systems, V10, P201
[9]  
Eskin E., 2002, GEOMETRIC FRAMEWORK
[10]  
Ghosh AK, 1999, PROCEEDINGS OF THE WORKSHOP ON INTRUSION DETECTION AND NETWORK MONITORING (ID '99), P51