Abstract
In cybersecurity, machine learning-based detection has emerged as a pivotal approach for discovering and mitigating various cyber dangers. The proposed PCA-SVM model demonstrates significant proficiency in distinguishing between normal and anomalous system access behaviors. By leveraging PCA for feature reduction and SVM for classification, the model achieves superior detection rates compared to existing intrusion detection methods. The dataset used in this research comprises two distinct classes, “Normal Location” and “Anomalous Location.” To generate a comprehensive dataset, synthetic data was created using Generative Adversarial Networks (GANs), focusing on longitude and latitude as the primary attributes representing location. This synthetic approach ensures a diverse and extensive dataset, essential for training a robust model. This indicates the effectiveness of the PCA-SVM approach in identifying and preventing a wide range of cyber threats. The optimistic results of this research highlight the potential for further research and development in the field, aiming to refine and expand upon the PCA-SVM integration for even greater efficacy in cyber threat detection.






Similar content being viewed by others
Data Availability
The dataset generated and analyzed during the current study are available from the corresponding author on reasonable request.
References
Borah P, Gupta D. Functional iterative approaches for solving support vector classification problems based on generalized Huber loss. Neural Comput Appl. 2020;32(1):1135–9.
Prasanna K. A CNN-LSTM Model for Intrusion Detection System from High Dimensional Data. J Inform Comput Sci. 2020;10:1362–70.
Cervantes J, Lamont FG. A comprehensive survey on support vector machine classification: Applications, challenges and trends. Neurocomputing. 30 September 2020;408:189–215.
Mostofa Ahsan, Kendall E, Nyagard. Cybersecurity threats and their mitigation approaches using machine Learning- A review. J Cybersecur Priv J Cybersecur Priv. 2022;2(3):527–55.
Muhammed Zekeriya Gunduz and Resul Das. Cyber security on smart grid: threats and potential solutions. Comput Networks Volume. March 2020;169:107094.
Radivilova T, Kirichenko L, Alghawli AS, Ilkov A, Tawalbeh M, Zinchenko P. The complex method of intrusion detection based on anomaly detection and misuse detection. In Proceedings of the 2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT), Kyiv, Ukraine, 14–18 May 2020; IEEE: Piscataway, NJ, USA, 2020:133–137.
Nalepa J, Kawulok M. Selecting training sets for support vector machines: a review. Artif Intell Rev. 2019;52(2):857–900.
Chadia EL, Btissam, Benchaji. A robust intrusion detection system based on a shallow learning model and feature extraction techniques. PLoS ONE. January 24, 2024.
Rajasekaran K. Classification and importance of intrusion detection system. Int J Comput Sci Inform Secur. 2020;10:44.
Xin Y, Kong L, Liu Z, Chen Y, Li Y, Zhu H, Gao M, Hou H, Wang C. Machine learning and deep learning methods for cybersecurity. IEEE Access. 2018;6:35365–81.
Vinayakumar R, Alazab M, Soman KP, Poornachandran P, Al-Nemrat A, Venkatraman S. Deep Learning Approach for Intelligent Intrusion Detection System, in IEEE Access. 2019;7:41525–41550.
Cai Jie L, Jiawei W, Shulin Y, Sheng. Feature selection in machine learning: a new perspective. Neurocomputing. 2018;300:70–79, ISSN 0925–2312.
Singh T, Di Troia F, Aaron Visaggio C. Support vector machines and malware detection. J Comput Virol Hacking Techniques. 2016;41(10):1–10.
Ahmer M, Shah A, Zafi SM, Shah S, et al. Using non-linear support vector machines for detection of activities of daily living. Indian J Sci Technol. 2017;10(36):1–8.
Acknowledgements
The author would like to thank REVA University, Bengaluru, Karnataka, India for their encouragement and support in carrying out this research work.
Funding
No funding received for this research.
Author information
Authors and Affiliations
Contributions
This research endeavor was made possible by the collaboration and contributions of all authors.
Corresponding author
Ethics declarations
Conflict of interest
No conflict of interest.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Pavithra, C., Saradha, M. A Comprehensive Classification Approach by Integrating Principal Component Analysis and Support Vector Machines for Advanced Intrusion Detection Systems. SN COMPUT. SCI. 5, 996 (2024). https://doi.org/10.1007/s42979-024-03308-z
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s42979-024-03308-z