Support Vector Machine and Principal Component Analysis for Intrusion Detection System

Amir Mukeri*, D P Gaikwad **
*-**Department of Computer Engineering, AISSMS College of Engineering, Pune Maharashtra, India.
Periodicity:January - March'2020
DOI : https://doi.org/10.26634/jse.14.3.17592

Abstract

In recent electronic era, computer networks are substantially evolved because of the rapid development in electronic communication, Internet of Things and Cyber Physical system. In electronic communication technologies, large amount of data is exchanged. As a result, these technologies are prone to several electronic attack, malicious actions, many security threats which can compromise the integrity and availability of information. To overcome these issues, an intrusion detection system is of significant importance in computer network. It is used for security and protection of the various communication infrastructures. For evaluating the performance of various intrusion detection systems, a suitable technique needs to be identified for the application specific dataset. It is very important to study the features of chosen dataset to increase accuracy and decrease training of intrusion detection model. Many researchers use different approaches of feature selection such as principal component analysis, hybrid techniques and chi square methods to decrease training time.

In this paper, an intelligent Network Intrusion Detection is implemented using Support Vector Machine Classifier. NSL KDD dataset is used for training and separate test data to evaluate the performance of the trained model. Different hyper parameter of Support Vector Machine viz. Y and C are used to tuned the model. The performance of this classifier on principal component analysis transformed dataset as well non-transformed dataset is studied and compared. The experimental results show that support vector machine trained on transformed dataset using Principal Component Analysis exhibits 2% less accuracy as compared with classifier trained on non-transferred dataset. However, classifier trained on transformed dataset using Principal Component Analysis take 15% less training time as compared to classifier trained with non-transferred dataset. The lesser accuracy of the Principal Component Analysis transformed data could be interpreted from the explanation of the variance obtained for top Principal Components as they do not capture the linear separation clearly between the two classes.

Keywords

Intrusion Detection System, Support Vector Machine, Feature Selection, Kernel, Parameters.

How to Cite this Article?

Mukeri, A., and Gaikwad, D. P. (2020). Support Vector Machine and Principal Component Analysis for Intrusion Detection System. i-manager's Journal on Software Engineering, 14(3), 42-49. https://doi.org/10.26634/jse.14.3.17592

References

[1]. Abusitta, A., Bellaiche, M., Dagenais, M., & Halabi, T. (2019). A deep learning approach for proactive multicloud cooperative intrusion detection system. Future Generation Computer Systems, 98, 308-318.
[2]. Ahmed, M, Mahmood, A. N., & Hu, J. (2016). A survey of network anomaly detection techniques. Journal of Network and Computer Applications, 60, 19–31.
[3]. Al-Hadhrami, Y., & Hussain, F. K. (2020). Real time dataset generation framework for intrusion detection systems in IoT. Future Generation Computer Systems, 108, 414–423. https://doi.org/10.1016/j.future.2020.02.051
[4]. Alpaydin, E. (2014). Introduction to Machine Learning (3rd Ed.), MIT Press.
[5]. Bajard, J. C., Martins, P., Sousa, L., & Zucca, V. (2019). Improving the Efficiency of SVM Classification with FHE. IEEE Transactions on Information Forensics and Security, 15, 1709-1722.
[6]. Karami, A. (2018). An anomaly-based intrusion detection system in presence of benign outliers with visualization capabilities. Expert Systems with Applications, 108, 36-60. https://doi.org/10.1016/j.eswa.2018.04.038
[7]. Luo, B., & Xia, J. (2014). A novel intrusion detection system based on feature generation with visualization strategy, Expert Systems with Applications, 41(9), 4139–4147.
[8]. Mahdavi, E., Fanian, A., & Amini, F. (2020). A real-time alert correlation method based on code-books for intrusion detection systems. Computers & Security, 89, 1- 18. https://doi.org/10.1016/j.cose.2019.101661
[9]. Marir, N., Wang, H., Feng, G., Li, B., & Jia, M. (2018). Distributed abnormal behavior detection approach based on deep belief network and ensemble svm using spark. IEEE Access, 6, 59657-59671.
[10]. Tama, B. A., Comuzzi, M., & Rhee, K. H. (2019). TSE-IDS: A two-stage classifier ensemble for intelligent anomalybased intrusion detection system. IEEE Access, 7, 94497- 94507. https://doi.org/10.1109/ACCESS.2019.2928048
[11]. Tao, P., Sun, Z., & Sun, Z. (2018). An improved intrusion detection algorithm based on GA and SVM. IEEE Access, 6, 13624-13631.
[12]. Thakkar, A., & Lohiya, R. (2020). Role of swarm and evolutionary algorithms for intrusion detection system: A survey. Swarm and Evolutionary Computation. https://doi. org/10.1016/j.swevo.2019.100631
[13]. Vijayanand, R., & Devaraj, D. (2020). A novel feature selection method using whale optimization algorithm and genetic operators for intrusion detection system in wireless mesh network. IEEE Access, 8, 56847-56854. https://doi. org/10.1109/ACCESS.2020.2978035.
[14]. Wang, W., Du, X., & Wang, N. (2018). Building a cloud IDS using an efficient feature selection method and SVM. IEEE Access, 7, 1345-1354. https://doi.org/10.1109/ ACCESS.2018.2883142
[15]. Yu, Y., & Bian, N. (2020). An intrusion detection method using few-shot learning. IEEE Access, 8, 49730- 49740.
[16]. Zhang, J., Ling, Y., Fu, X., Yang, X., Xiong, G., & Zhang, R. (2020). Model of the intrusion detection system based on the integration of spatial-temporal features. Computers & Security, 89, 101681.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.