A novel intrusion detection system based on hierarchical clustering and support vector machines

  • Authors:
  • Shi-Jinn Horng;Ming-Yang Su;Yuan-Hsin Chen;Tzong-Wann Kao;Rong-Jian Chen;Jui-Lin Lai;Citra Dwi Perkasa

  • Affiliations:
  • Department of Computer Science and Information Engineering, National Taiwan University of Science and Technology, 43, Sec/4. Kee-Lung Road, 106 Taipei, Taiwan and Department of Electronic Engineer ...;Department of Computer Science and Information Engineering, Ming Chuan University, Taoyuan, Taiwan;Department of Electronic Engineering, National United University, Miaoli, Taiwan;Department of Electronic Engineering, Northern Taiwan Institute of Science and Technology, Taipei, Taiwan;Department of Electronic Engineering, National United University, Miaoli, Taiwan;Department of Electronic Engineering, National United University, Miaoli, Taiwan;Department of Computer Science and Information Engineering, National Taiwan University of Science and Technology, 43, Sec/4. Kee-Lung Road, 106 Taipei, Taiwan

  • Venue:
  • Expert Systems with Applications: An International Journal
  • Year:
  • 2011

Quantified Score

Hi-index 12.05

Visualization

Abstract

This study proposed an SVM-based intrusion detection system, which combines a hierarchical clustering algorithm, a simple feature selection procedure, and the SVM technique. The hierarchical clustering algorithm provided the SVM with fewer, abstracted, and higher-qualified training instances that are derived from the KDD Cup 1999 training set. It was able to greatly shorten the training time, but also improve the performance of resultant SVM. The simple feature selection procedure was applied to eliminate unimportant features from the training set so the obtained SVM model could classify the network traffic data more accurately. The famous KDD Cup 1999 dataset was used to evaluate the proposed system. Compared with other intrusion detection systems that are based on the same dataset, this system showed better performance in the detection of DoS and Probe attacks, and the beset performance in overall accuracy.