Network intrusion detection based on random forest and support vector machine

被引:64
作者
Chang, Yaping [1 ]
Li, Wei [1 ]
Yang, Zhongming [1 ]
机构
[1] Guangdong Polytech Sci & Technol, Comp Engn Tech Coll, Zhuhai, Peoples R China
来源
2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1 | 2017年
关键词
network intrusion detection; random forest; support vector machine; feature selection;
D O I
10.1109/CSE-EUC.2017.118
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The network intrusion detection techniques are important to prevent our system and network from malicious behaviors. In order to improve accuracy of network intrusion detection, machine learning, feature selection and optimization methods have been used, and the result tell us that the combination of machine learning and feature selection can improve accuracy. In this study, we developed a new machine learning approach for predicting network intrusion based on random forest and support vector machine. Since there were many potential features for network intrusion classification, random forest were used for feature selection based on variable importance score. We found that the host-based statistical features of network flow play an important role in predicting network intrusion. The performance of the support vector machine which used the 14 selected features on KDD 99 dataset has been evaluated by comparing it with the total(41) features and popular classifiers. The result showed that the selected features can achieve higher attack detection rate and it can be one of the competitive classifier for network intrusion detection.
引用
收藏
页码:635 / 638
页数:4
相关论文
共 11 条
[1]   Random forests [J].
Breiman, L .
MACHINE LEARNING, 2001, 45 (01) :5-32
[2]   LIBSVM: A Library for Support Vector Machines [J].
Chang, Chih-Chung ;
Lin, Chih-Jen .
ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2011, 2 (03)
[3]   A hybrid network intrusion detection system using simplified swarm optimization (SSO) [J].
Chung, Yuk Ying ;
Wahid, Noorhaniza .
APPLIED SOFT COMPUTING, 2012, 12 (09) :3014-3022
[4]  
Cong Li, 2017, APPL RES COMPUTERS, V33, P75
[5]  
[高妮 Gao Ni], 2017, [电子学报, Acta Electronica Sinica], V45, P730
[6]   An active learning based TCM-KNN algorithm for supervised network intrusion detection [J].
Li, Yang ;
Guo, Li .
COMPUTERS & SECURITY, 2007, 26 (7-8) :459-467
[7]   An efficient intrusion detection system based on support vector machines and gradually feature removal method [J].
Li, Yinhui ;
Xia, Jingbo ;
Zhang, Silan ;
Yan, Jiakai ;
Ai, Xiaochuan ;
Dai, Kuobin .
EXPERT SYSTEMS WITH APPLICATIONS, 2012, 39 (01) :424-430
[8]   Intrusion Detection using Naive Bayes Classifier with Feature Reduction [J].
Mukherjee, Saurabh ;
Sharma, Neelam .
2ND INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION, CONTROL AND INFORMATION TECHNOLOGY (C3IT-2012), 2012, 4 :119-128
[9]  
Wu Li-yun, 2017, Control and Decision, V32, P755, DOI 10.13195/j.kzyjc.2016.0133
[10]  
Xiao Guorong, 2014, Computer Engineering and Applications, V50, P75