A novel network security algorithm based on improved support vector machine from smart city perspective

https://doi.org/10.1016/j.compeleceng.2017.09.028Get rights and content

Abstract

Computer generated security concerns have become more modern and complex. Intrusion detection(ID) is a practical issue in the field of computer security whose primary objective is to detect rare attack or assaults and to ensure the security of interior systems. This paper also proposes a semi-class intrusion detection method that combines multiple classifiers to arrange exceptions and typical exercises in a computer system. The abuse detection model is constructed in the light of the decision tree learning-iterative dichotomise 3(DTL-ID3) and is assembled by utilizing the gathered data based on anomaly detection model executed by one class-support vector machine(OC-SVM). In recent years, people have paid more attention to ID/intrusion prevention system (IDS / IPS), which is closely related to the protection and utilization of system management. A few machine-learning standards including neural system, direct hereditary programming, and advanced support vector machines(ASVMs), Bayesian system, multivariate versatile relapse splines, fluffy derivation systems(FIS) and other analogical systems have been researched for the outline of intrusion detection system. In this paper, we build up an amalgam method based on DTL-ID3 and OC-SVM(A-DT and SVM) and evaluate the performance of the projected methodology by using a specific dataset and a crossover method in order to enhance the accuracy of IDS/IPS when contrasted with a singular support vector machine.

Introduction

The fast advancement and improvement of the Internet has brought security problems to systems which is progressively becoming a extraordinary issue and has been a concentration in the ebb and flow exploration. In recent years, people pay more attention to the problem of IDS, which is closely related to the covert use of system management [3]. In any case, it is difficult to detect the assault and the typical system access. In today's IDS, large-scale information grouping and scheduling has become increasingly important and has become a test area. Albeit different apparatuses are projected, they are productive for certain applications adequately, which are used for exponential developing high dimensional information inputs [7], [9]. Intrusion detection systems are designed to protect computer systems from various digital attacks and infections [13]. The intrusion detection system constructs a robust feature model and examples to identify the general practices of system information described by nonstandard practices. Two basic hypotheses in intrusion detection are studied, for example, client and program exercises can be recognized by PC systems according to system reviewing mechanisms, and ordinary and intrusion exercises must have particular practices. The field of intrusion detection consists of two different approaches, that are abuse detection and anomaly detection [17], [18]. The basic idea of misuse of investigation is to detect the attack of a certain type or target in some way, and even identify the types of these attacks. In view of these signs, this method identifies attacks by describing the criteria for each known attack [1]. The trouble for identifying obscure assaults has become a fundamental drawback in the mark-based method. The primary objective of the anomaly detection method is to describe the typical activities of the manufacturing factual model. In this point, any deviation from this model can be viewed as an anomaly, and perceived as an assault [20]. When this approach is utilized, it can identify obscure assaults hypothetically, despite the fact happened now and again, the considered approach gives rise to high false assault rate. Given the general manufacture models in the past few years, people are keen to develop new manufacturing models [6], [10].

Anomaly detection approach is one of the extremely dynamic researches in the machine learning group, which has been the theme of presented numerous articles over many years. The best approach depends on gathering information from typical operations of the system. In view of this information portraying ordinariness, if any deviation is seen in any case, it would be considered as an anomaly [11]. A few machine learning standards include the hidden Markov model, bolster VM, fake neural system, counterfeit neural system and multivariate versatile relapse splines fluffy surmising systems, which have been researched for the outline of IDS [19]. In the manuscript, we conduct researches and assess the performance of OC-SVM. The proposed amalgam method based on decision tree learning-ID3 and OC-SVM is a combination of A-DT and SVM. Compared with the different methods, it can improve the accuracy of IDS intrusion detection system by using half method [27]. The rest of the paper is organized as the follows. In the Section 2, we review the state-of-the-art related works; in the Section 3, we introduced IEEE Transactions on Reliability; in the Section 4, we discussed the DTL-ID3; in the Section 5, we analysed the A-DT & SVM; in the Section 6, we implemented the proposed method with the experimental simulation; the Section 7 summarized the work.

Section snippets

Related works

Unique strategies and methods are used as part of future development. The primary procedures utilized in this paper are measurable methodologies, prescient example era, master systems, keystroke observing, demonstrate based state transition analysis, intrusion detection, design coordinating, and information mining strategies. The fact methodology examines the late behaviour of PC system clients. Remarkably, abnormal behaviour is considered an invasion [2]. The method needs to improve the

One class-support vector machine (OC-SVM)

According to an amalgam method based on DTL-ID3 and OC-SVM which is a combination of A-DT and SVM intended for IDS/IPS. The idea is put forward to detect an exact attack or problem. Before the planned methodology is proposed, it becomes important to take a glance at OC-SVM, DTL-ID3 and their system intrusion detection. Hence the widely used algorithm for the proposed method OC-SVM is discussed in this manuscript. One OC-SVM are made and given out on rules of auxiliary hazard minimization. Our

Overview of decision tree learning – ID3 (iterative dichotomise 3) (DTL-ID3)

Decision tree learning-ID3 (iterative dichotomise 3) (DTL-ID3) review has been talked about. DTL-ID3 is one of the most broadly utilized and pragmatic methods for inductive surmising over administered information. A decision tree speaks to a method of identifying specific information based on its characteristics. It also applies to the information metric for preparing inflation, so DT is often utilized as a part of information mining application. The development of DT does not require any

Proposed methododlogy- amalgam method of decision tree learning- ID3 (iterative dichotomise 3) (DTL-ID3) and one class -support vector machine (OC-SVM) (A-DT & SVM)

Semi smart systems employ methods that coordinate different learning patterns. Each learned method works in an alternating manner, with elements of different arrangements. Coordination of different learning patterns provides better performance in individual learning or decision making patterns by reducing their respective limitations and misusing their unique mechanisms.

At each level of the semi intelligent system, each layer provides new data. The general work of the system depends on the

Research, outcomes and discussion

This segment assesses the performance of individual OC-SVM and an amalgam method of DTL-ID3, A-DT and SVM. Information set alongside evaluation criteria has been discussed in this segment. In this paper, the DARPA intrusion detection data sets challenge information is utilized to demonstrate the predominance of the proposed calculation. The DARPA intrusion detection data sets contains ordinary information and four sorts of assault, for example, testing, disavowal of administration. In the DARPA

Conclusion

The exploration done by the author is to examine the IDS and assess the enactment in view of the detection of data collections. Arrangement, grouping, affiliation, regression, sequence finding, information perception and expectation are the regular approaches used in construction of the model of delineated IDS. The review is done based on these methods and have been discussed so far. This is done in order to review the information in the register model. Experimental outcomes uncover the amalgam

Acknowledgement

This paper is financially supported by the National Science Fund Subsidized Project. (NO. 61170168, 61170169)

Xiang Zou is now applying for his Ph.D. degree at Northeastern University, Liaoning, China. His major contribution is in the field of computer network security and big data applications.

References (39)

Cited by (17)

  • Intrusion detection system based on hybridizing a modified binary grey wolf optimization and particle swarm optimization

    2022, Expert Systems with Applications
    Citation Excerpt :

    The selection of these machine learning classifiers is based on an extensive review of the existing machine learning method used in IDS. The review reveals that the SVM and decision tree are commonly used in IDS such as (Al-Yaseen et al., 2017; Zou et al., 2018; Lin et al., 2012) with relatively high efficiency and effectiveness (Amarudin, 2020). The proposed hybrid method is used to select the most significant features that contribute to detecting malicious attacks.

  • Improving communication precision of IoT through behavior-based learning in smart city environment

    2020, Future Generation Computer Systems
    Citation Excerpt :

    This security system is designed for intelligent city building (ICB) using registration, secure communication session, revocation and data exchange phases. Zou et al. [21] introduced a network security algorithm for smart city user communication. The security algorithm is used for mitigating intrusion using one class-support vector machine (OC-SVM).

  • Malware Detection in AdHoc E-Government Network Using Machine Learning

    2023, HORA 2023 - 2023 5th International Congress on Human-Computer Interaction, Optimization and Robotic Applications, Proceedings
  • Identification of Abnormal Behavior in Activities of Daily Life Using Novelty Detection

    2023, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
View all citing articles on Scopus

Xiang Zou is now applying for his Ph.D. degree at Northeastern University, Liaoning, China. His major contribution is in the field of computer network security and big data applications.

Jinghua Cao is now studying Traffic Information Engineering and Control in Dalian Maritime University, Liaoning, China.

Quan Guo is the professor of Network Security and Computing Technology at Provincial Key Laboratory, Dalian Neusoft University of Information, China.

Tao Wen is a professor at Northeastern University, Liaoning, China. In the past 20 years, he has published nearly 100 papers on SCI/EI index.

Reviews processed and recommended for publication to the Editor-in-Chief by Associate Editor Dr. S. Smys.

View full text