Skip to main content

Principal Component Neural Networks Based Intrusion Feature Extraction and Detection Using SVM

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3611))

Abstract

Very little research on feature extraction has been taken in the field of network intrusion detection. This paper proposes a novel method of applying principal component neural networks for intrusion feature extraction, and then the extracted features are employed by SVM for classification. The adaptive principal components extraction (APEX) algorithm is adopted for the implementation of PCNN. The MIT’s KDD Cup99 dataset is used to evaluate the proposed method compared to SVM without application of feature extraction technique, which clearly demonstrates that PCNN-based feature extraction method can greatly reduce the dimension of input space without degrading or even boosting the performance of intrusion detection system.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   119.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Giacinto, G., Roli, F., Didaci, L.: Fusion of multiple classifiers for intrusion detection in computer networks. Pattern Recognition Letters 24, 1795–1803 (2003)

    Article  Google Scholar 

  2. NSTAC Intrusion Detection Subgroup: Report on the NS/EP Implications of Intrusion Detection Technology Research and Development, http://www.ncs.gov/nstac/FIDSGREP.pdf

  3. Yang, X.R., Shen, J.Y., Wang, R.: Artificial immune theory based network intrusion detection system and the algorithms design. In: Proceedings of 2002 International Conference on Machine Learning and Cybernetics, vol. 1, pp. 73–77 (2002)

    Google Scholar 

  4. Cho, S., Cha, S.: SAD: web session anomaly detection based on parameter estimation. Computers & Security 23, 312–319 (2004)

    Article  Google Scholar 

  5. Oh, S.H., Lee, W.S.: An anomaly intrusion detection method by clustering normal user behavior. Computers & Security 22, 596–612 (2003)

    Article  Google Scholar 

  6. Wang, Y., Yang, H.H., Wang, X.Y., et al.: Distributed Intrusion Detection System Based on Data Fusion Method. In: The 5th World Congress on Intelligent Control and Automation, pp. 4331–4334. IEEE Press, New Jersey (2004)

    Chapter  Google Scholar 

  7. Sung, A.H., Mukkamala, S.: Identify important features for intrusion detection using support vector machines and neural networks. In: IEEE Proceedings of the 2003 Symposium on Application and the Internet, pp. 209–216 (2003)

    Google Scholar 

  8. Haykin, S.: Neural Networks: A comprehensive foundation. Prentice-Hall, Englewood Cliffs (1999)

    MATH  Google Scholar 

  9. Vapnik, V.N.: The Nature of Statistical Learning Theory. Springer, New York (1995)

    MATH  Google Scholar 

  10. KDD Cup 99 Data, http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html

  11. Kim, W., Oh, S.C., Yoon, K.: Intrusion Detection Based on Feature Transform Using Neural Network. In: Bubak, M., van Albada, G.D., Sloot, P.M.A., Dongarra, J. (eds.) ICCS 2004. LNCS, vol. 3037, pp. 212–219. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gao, HH., Yang, HH., Wang, XY. (2005). Principal Component Neural Networks Based Intrusion Feature Extraction and Detection Using SVM. In: Wang, L., Chen, K., Ong, Y.S. (eds) Advances in Natural Computation. ICNC 2005. Lecture Notes in Computer Science, vol 3611. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11539117_4

Download citation

  • DOI: https://doi.org/10.1007/11539117_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28325-6

  • Online ISBN: 978-3-540-31858-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics