String Kernel Based SVM for Internet Security Implementation

  • Authors:
  • Zbynek Michlovský;Shaoning Pang;Nikola Kasabov;Tao Ban;Youki Kadobayashi

  • Affiliations:
  • Knowledge Engineering & Discover Research Institute, Auckland University of Technology, Auckland, New Zealand 1020;Knowledge Engineering & Discover Research Institute, Auckland University of Technology, Auckland, New Zealand 1020;Knowledge Engineering & Discover Research Institute, Auckland University of Technology, Auckland, New Zealand 1020;Information Security Research Center, National Institute of Information and Communications Technology, Tokyo, Japan 184-8795;Information Security Research Center, National Institute of Information and Communications Technology, Tokyo, Japan 184-8795

  • Venue:
  • ICONIP '09 Proceedings of the 16th International Conference on Neural Information Processing: Part II
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

For network intrusion and virus detection, ordinary methods detect malicious network traffic and viruses by examining packets, flow logs or content of memory for any signatures of the attack. This implies that if no signature is known/created in advance, attack detection will be problematical. Addressing unknown attacks detection, we develop in this paper a network traffic and spam analyzer using a string kernel based SVM (support vector machine) supervised machine learning. The proposed method is capable of detecting network attack without known/earlier determined attack signatures, as SVM automatically learning attack signatures from traffic data. For application to internet security, we have implemented the proposed method for spam email detection over the SpamAssasin and E. M. Canada datasets, and network application authentication via real connection data analysis. The obtained above 99% accuracies have demonstrated the usefulness of string kernel SVMs on network security for either detecting `abnormal' or protecting `normal' traffic.