Use Dimensionality Reduction and SVM Methods to Increase the Penetration Rate of Computer Networks

12/07/2018
by   Amir Moradibaad, et al.
0

In the world today computer networks have a very important position and most of the urban and national infrastructure as well as organizations are managed by computer networks, therefore, the security of these systems against the planned attacks is of great importance. Therefore, researchers have been trying to find these vulnerabilities so that after identifying ways to penetrate the system, they will provide system protection through preventive or countermeasures. SVM is one of the major algorithms for intrusion detection. In this research, we studied a variety of malware and methods of intrusion detection, provide an efficient method for detecting attacks and utilizing dimension reduction.Thus, we will be able to detect attacks by carefully combining these two algorithms and pre-processes that are performed before the two on the input data. The main question raised is how we can identify attacks on computer networks with the above-mentioned method. In anomalies diagnostic method, by identifying behavior as a normal behavior for the user, the host, or the whole system, any deviation from this behavior is considered as an abnormal behavior, which can be a potential occurrence of an attack. The network intrusion detection system is used by anomaly detection method that uses the SVM algorithm for classification and SVD to reduce the size. Steps of the proposed method include pre-processing of the data set, feature selection, support vector machine, and evaluation.The NSL-KDD data set has been used to teach and test the proposed model. In this study, we inferred the intrusion detection using the SVM algorithm for classification and SVD for diminishing dimensions with no classification algorithm.Also the KNN algorithm has been compared in situations with and without diminishing dimensions,the results have shown that the proposed method has a better performance than comparable methods.

READ FULL TEXT

page 5

page 14

page 15

page 16

research
12/27/2017

An empirical evaluation for the intrusion detection features based on machine learning and feature selection methods

Despite the great developments in information technology, particularly t...
research
08/29/2023

Assessing Cyclostationary Malware Detection via Feature Selection and Classification

Cyclostationarity involves periodic statistical variations in signals an...
research
05/19/2020

A cognitive based Intrusion detection system

Intrusion detection is one of the primary mechanisms to provide computer...
research
05/03/2014

A Network Intrusions Detection System based on a Quantum Bio Inspired Algorithm

Network intrusion detection systems (NIDSs) have a role of identifying m...
research
12/13/2020

Application of deep learning to enhance the accuracy of intrusion detection in modern computer networks

Application of deep learning to enhance the accuracy of intrusion detect...
research
03/28/2021

A Survey on Ethical Hacking: Issues and Challenges

Security attacks are growing in an exponential manner and their impact o...
research
11/25/2019

Host-based anomaly detection using Eigentraces feature extraction and one-class classification on system call trace data

This paper proposes a methodology for host-based anomaly detection using...

Please sign up or login with your details

Forgot password? Click here to reset