Open Access   Article Go Back

Performance Comparison of Multi class SVM, Support Vector Machine, k-NN and Binary Classification for Intrusion Detection

Kumar Parasuraman1 , A. Anbarasa Kumar2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-8 , Page no. 204-211, Aug-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i8.204211

Online published on Aug 31, 2018

Copyright © Kumar Parasuraman, A. Anbarasa Kumar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Kumar Parasuraman, A. Anbarasa Kumar, “Performance Comparison of Multi class SVM, Support Vector Machine, k-NN and Binary Classification for Intrusion Detection,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.204-211, 2018.

MLA Style Citation: Kumar Parasuraman, A. Anbarasa Kumar "Performance Comparison of Multi class SVM, Support Vector Machine, k-NN and Binary Classification for Intrusion Detection." International Journal of Computer Sciences and Engineering 6.8 (2018): 204-211.

APA Style Citation: Kumar Parasuraman, A. Anbarasa Kumar, (2018). Performance Comparison of Multi class SVM, Support Vector Machine, k-NN and Binary Classification for Intrusion Detection. International Journal of Computer Sciences and Engineering, 6(8), 204-211.

BibTex Style Citation:
@article{Parasuraman_2018,
author = {Kumar Parasuraman, A. Anbarasa Kumar},
title = {Performance Comparison of Multi class SVM, Support Vector Machine, k-NN and Binary Classification for Intrusion Detection},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2018},
volume = {6},
Issue = {8},
month = {8},
year = {2018},
issn = {2347-2693},
pages = {204-211},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2676},
doi = {https://doi.org/10.26438/ijcse/v6i8.204211}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i8.204211}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2676
TI - Performance Comparison of Multi class SVM, Support Vector Machine, k-NN and Binary Classification for Intrusion Detection
T2 - International Journal of Computer Sciences and Engineering
AU - Kumar Parasuraman, A. Anbarasa Kumar
PY - 2018
DA - 2018/08/31
PB - IJCSE, Indore, INDIA
SP - 204-211
IS - 8
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
454 424 downloads 229 downloads
  
  
           

Abstract

Intrusion detection is a fundamental part of security tools, for example, adaptive security appliances, intrusion detection systems, intrusion prevention systems and firewalls. Intrusion detection systems (IDS) plays a important role in detecting the attacks that occur in the PC or networks. Intrusion detection systems (IDS) are the network security mechanism that monitors network and system activities for malicious action.it become indispensable tool to keep information system safe and reliable. Different intrusion detection methods are used, but their performance is an problem. . Intrusion detection performance depends on accuracy, which needs to enhance to decrease false alarms and to increase the detection rate. Such procedures demonstrate limitations, are efficient for use in large datasets, for example, system, and network data. The intrusion detection system is used to analyzing huge traffic data, therefore efficient classification method is important to overcome the issue. Well-known machine learning techniques, namely, SVM, Multiclass SVM, k-NN, Binary Classification (BC) are applied. These techniques well known because of their capability in Classification. The NSL–knowledge discovery and data mining, dataset is used, which is considered a benchmark in the evaluation of intrusion detection mechanisms. The results indicate that Multiclass SVM outperforms other approaches.

Key-Words / Index Term

Support vector machine SVM, Multiclass SVM, k-NN, Binary Classification, NSL-KDD

References

[1] Binhan Xu, Shuyu Chen, Hancui Zhang, Tianshu Wu,” Incremental k-NN, SVM Method in Intrusion Detection”
[2] Manjiri V. Kotpalliwar, 2Rakhi Wajgi” Classification of Attacks Using Support Vector Machine (SVM) on KDDCUP’99 IDS Database”
[3] Muhammad Shakil Pervez, and Dewan Md. Farid “Feature Selection and Intrusion classification in NSL-KDD Cup 99 Dataset Employing SVMs”
[4] Sumaiya Thaseen, Ch.Aswani Kumar “Intrusion Detection Model Using fusion of PCA and
Optimized SVM”
[5]A.M.Chandrasekar, K.Raghuveer, Intrusion Detection Techniques by using K-Means, Fuzzy Neural Networks, SVM Classifier
[6] Noreen Kausar , Brahim Belhaouari Samir, Suziah Sulaiman, Iftikhar Ahmad , Muhammad Hussain “An Approach towards Intrusion Detection using PCA Feature Subsets and SVM”
[7] I. Ahmad, M. Basheri, M.J. Iqbal, A. Raheem “Performance comparison of support vector machine, random forest, and extreme learning machine for intrusion detection”
[8] Gong Shang-fu,Zhao Chun-lan “Intrusion Detection System Based on Classification”
[9] Nathan Shone, Tran Nguyen Ngoc, Vu Dinh Phai, and Qi Shi “A Deep Learning Approach to Network Intrusion Detection”
[10] Longjie Li, Yang Yu, Shenshen Bai, Ying Hou, and Xiaoyun Chen,”An Effective Two-Step Intrusion Detection Approach Based on Binary Classification and k-NN”
[11] Chuanlong Yin, Yuefei Zhu, Jinlong Fei, and Xinzheng He “Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks “
[12] Rajesh Wankhede, G. H. Raisoni “Intrusion Detection System using Classification Technique”
[13] Abdulla Amin Aburomman, Mamun Bin Ibne Reaz “A novel SVM-kNN-PSO ensemble method for intrusion detection system “
[14]H. Wang, J. Gu, S. Wang, “An effective intrusion detection framework based on SVM with feature augmentation, Knowledge-Based Systems”, Volume 136, 2017, Pages 130-139, ISSN 0950-7051, https://doi.org/10.1016/j.knosys.2017.09.014.
[15]F. Kuang, X. Weihong , S. Zhang, A novel hybrid KPCA and SVM with GA model for intrusion detection, Applied Soft Computing,Volume 18,2014,Pages 178-184,ISSN 1568-4946, https://doi.org/10.1016/j.asoc.2014.01.028.
[16]A. A. Aburomman, M.B. Reaz, A novel SVM-kNN-PSO ensemble method for intrusion detection system, Applied Soft Computing, Volume 38, 2016, Pages 360-372, ISSN 1568-4946, https://doi.org/10.1016/j.asoc.2015.10.011.
[17]M.R. Raman, N. Somu, K. Kirthivasan, R. Liscano, V.S. Sriram, An efficient intrusion detection system based on hypergraph - Genetic algorithm for parameter optimization and feature selection in support vector machine, Knowledge-Based Systems, Volume 134, 2017, Pages 1-12, ISSN 0950-7051, https://doi.org/10.1016/j.knosys.2017.07.005.
[18] S. Teng, N. Wu, H. Zhu, L. Teng and W. Zhang, "SVM-DT-based adaptive and collaborative intrusion detection," in IEEE/CAA Journal of Automatica Sinica, vol. 5, no. 1, pp. 108-118, Jan. 2018. doi: 10.1109/JAS.2017.7510730.
[19] N.Farnaaz, M.A. Jabbar, Random Forest Modeling for Network Intrusion Detection System, Procedia Computer Science, Volume 89, 2016, Pages 213-217, ISSN.18770509,https://doi.org/10.1016/j.procs.2016.06
[20] Chih-Wei Hsu and Chih-Jen Lin, “A Comparison of Methods for Multiclass Support Vector Machines”, IEEE Transaction on Neural Networks, 2002.
[21].Ahmad, F. Amin, "Towards feature subset selection in intrusion detection," 2014 IEEE 7th Joint International Information Technology and Artificial Intelligence Conference, Chongqing, 2014, pp. 68-73.
[22]S.M. Bamakan, H. Wang, T. Yingjie, Y. Shi, An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization, Neuro computing, Volume 199, 2016, Pages 90-102.
[23] J.Jayshree, and L. Ragha. "Intrusion detection system using support vector machine." International Journal of Applied Information Systems (HAIS)-ISSN (2013): 2249-0868
[24] C.C .Chang,.and C.J. Lin., 2011. LIBSVM: a library for support vector machines. ACM transactions on intelligent systems and technology (TIST), 2(3), p.27.