Robust Real-time Intrusion Detection System


Byung-Joo Kim, Il-Kon Kim, Journal of Information Processing Systems Vol. 1, No. 1, pp. 9-13, Dec. 2005  


Keywords: real-time IDS, kernel PCA. LS-SVM
Fulltext:

Abstract

Computer security has become a critical issue with the rapid development of business and other ftansaction systems over the Intemet. The application of atlificial intelligence, machine learning and data mining techdques to intrusion detection systems has been increasing recently. But most research is focused on improving the classification performaace of a classifier. Selecting important features from input data leads to simplification olthe problem, and faster and more accuate detection rates. Thus selecting important features is ar impofiant issue in intrusion detection. Alother issue in intrusion detection is that inost of the intrusion detection systems are performed by offJine and it is not a suitable method for a real-time intrusion detection system. In this paper, we develop the real-time intrusion detection system, which combines an online feature extraction method with the Least Squares Suppofi Vector Machine classifier. Applying the proposed system to KDD CUP 99 data, experimental results show that it has a remarkable feature extraction and classification performance compared to existing off-line intntsion detection systems.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.




Cite this article
[APA Style]
Kim, B. & Kim, . (2005). Robust Real-time Intrusion Detection System. Journal of Information Processing Systems, 1(1), 9-13. DOI: .

[IEEE Style]
B. Kim and , "Robust Real-time Intrusion Detection System," Journal of Information Processing Systems, vol. 1, no. 1, pp. 9-13, 2005. DOI: .

[ACM Style]
Byung-Joo Kim and Il-Kon Kim. 2005. Robust Real-time Intrusion Detection System. Journal of Information Processing Systems, 1, 1, (2005), 9-13. DOI: .