Skip to main content
Log in

A t-SNE based non linear dimension reduction for network intrusion detection

  • Original Research
  • Published:
International Journal of Information Technology Aims and scope Submit manuscript

Abstract

With the increased dependence on the internet for day to day activities, the need to keep the networks secure has become more vital. The quest of securing the computer systems and networks, from the users with destructive mindset, has resulted in the invention of surfeit devices and methods. One such method against whom the responsibility of discriminating between normal and harmful data, flowing on the network is, intrusion detection system (IDS). In this work an IDS model based on support vector machines is proposed. In order to enhance the detection capability of support vector machine based model for intrusion detection, and to eliminate the inherent problem of intrusion detection i.e, low accuracy of the system in detecting user to root and remote to local attacks, this paper proposes to use recent non-linear dimension reduction technique to enhance the discrimination of the data. Results demonstrate that t-SNE based dimension reduction improve the accuracy of SVM for network intrusion detection system. A comparison of the proposed system with the previous works has proven that this work has enhanced detection rate for almost all the attack groups.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Domingue J, Zahariadis T, Lambert D, Cleary F, Daras P, Krco S, Li M-S, Schaffers H, Lotz V, Stiller B et al (2011) The future internet. Springer, Berlin

    Book  Google Scholar 

  2. Tsai C-F, Lin C-Y (2010) A triangle area based nearest neighbors approach to intrusion detection. Pattern Recognit 43(1):222–229

    Article  Google Scholar 

  3. Wang G, Hao J, Ma J, Huang L (2010) A new approach to intrusion detection using artificial neural networks and fuzzy clustering. Expert Syst Appl 37(9):6225–6232

    Article  Google Scholar 

  4. Liao Y, Vemuri VR (2005) Machine learning in intrusion detection. Enhancing Computer Security with Smart Technology, p 93

  5. Hughes G (1968) On the mean accuracy of statistical pattern recognizers. IEEE Trans Inf Theory 14(1):55–63

    Article  Google Scholar 

  6. Dunteman GHC (1989) Principal components analysis. Sage, no. 69

  7. Kruskal JB, Wish M (1978) Multidimensional scaling. Sage 11

  8. Demartines P, Hérault J (1997) Curvilinear component analysis: a self-organizing neural network for nonlinear mapping of data sets. IEEE Trans Neural Netw 8(1):148–154

    Article  Google Scholar 

  9. Hinton GE, Roweis ST (2002) Stochastic neighbor embedding. In: Advances in neural information processing systems, pp 833–840

  10. Lunga D, Ersoy O (2013) Spherical stochastic neighbor embedding of hyperspectral data. IEEE Trans Geosci Rem Sens 51(2):857–871

    Article  Google Scholar 

  11. Tenenbaum JB, De Silva V, Langford JC (2000) A global geometric framework for nonlinear dimensionality reduction. Science 290(5500):2319–2323

    Article  Google Scholar 

  12. Van Der Maaten L (2014) Accelerating t-sne using tree-based algorithms. J Mach Learn Res 15(1):3221–3245

    MathSciNet  MATH  Google Scholar 

  13. Hearst MA, Dumais ST, Osman E, Platt J, Scholkopf B (1998) Support vector machines. IEEE Intell Syst Appl 13(4):18–28

    Article  Google Scholar 

  14. Hamid Y, Sugumaran M, Balasaraswathi V (2016) Ids using machine learning-current state of art and future directions. Br J Appl Sci Technol 15(3)

    Article  Google Scholar 

  15. Liao H-J, Lin C-HR, Lin Y-C, Tung K-Y (2013) Intrusion detection system: a comprehensive review. J Netw Comput Appl 36(1):16–24

    Article  Google Scholar 

  16. Tsai C-F, Hsu Y-F, Lin C-Y, Lin W-Y (2009) Intrusion detection by machine learning: a review. Expert Syst Appl 36(10):11994–12000

    Article  Google Scholar 

  17. Kim G, Lee S, Kim S (2014) A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Syst Appl 41(4):1690–1700

    Article  MathSciNet  Google Scholar 

  18. Luo B, Xia J (2014) A novel intrusion detection system based on feature generation with visualization strategy. Expert Syst Appl 41(9):4139–4147

    Article  MathSciNet  Google Scholar 

  19. Hamid Y, Sugumaran M, Journaux L (2016) A fusion of feature extraction and feature selection technique for network intrusion detection. Int J Secur Appl 10(8):151–158

    Google Scholar 

  20. Xia Y-X, Shi Z-C, Hu Z-H (2009) An incremental svm forintrusion detection based on key feature selection. In: Intelligent information technology application, 2009. IITA2009. Third International Symposium on IEEE, vol. 3, pp 205–208

  21. Xie L, Zhu D, Yang H (2009) Research on svm based network intrusion detection classification. In: Fuzzy systems and knowledge discovery, 2009. FSKD’09. Sixth International Conference on IEEE

  22. Mukkamala S, Janoski G, Sung A (2002) Intrusion detection using neural networks and support vector machines. In: Neural networks, 2002. IJCNN’02. Proceedings of the 2002 International Joint Conference on IEEE, vol. 2, pp 1702–1707

  23. Heba FE, Darwish A, Hassanien AE, Abraham A (2010) Principle components analysis and support vector machine based intrusion detection system. In: 2010 10th international conference on intelligent systems design and applications, pp 363–367

  24. Labib K, Vemuri VR (2006) An application of principal component analysis to the detection and visualization of computer network attacks. In: Annales des télécommunications, vol. 61, no. 1-2. Springer, pp 218–234

  25. Kuchimanchi GK, Phoha VV, Balagani KS, Gaddam SR (2004) Dimensionreduction using feature extraction methods for real-time misusedetection systems. In: Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC, pp 195–202

  26. Day CW (2006) Intrusion detection system using self-organizing clusters, uS Patent 7,017,186

  27. Zanero S, Savaresi SM (2004) Unsupervised learning techniques for an intrusion detection system. In: Proceedings of the 2004 ACM symposium on Applied computing. ACM, pp 412–419

  28. Day CW (2007) Intrusion detection system, US Patent 7,260,846

  29. Dash SK, Rawat S, Pujari AK (2006) Lle on system calls for host based intrusion detection. In: 2006 international conference on computational intelligence and security, vol. 1, pp 609–612

  30. Lee JA, Verleysen M (2007) Nonlinear dimensionality reduction. Springer, New York

    Book  Google Scholar 

  31. Li Y, Wang Y, Zi Y, Zhang M (2015) An enhanced data visualization method for diesel engine malfunction classification using multi-sensor signals. Sensors 15(10):26675–26693

    Article  Google Scholar 

  32. Delion C, Journaux L, Payen A, Sautot L, Chevigny E, Curmi P (2015) Nldr methods for high dimensional nirs dataset: application to vineyard soils characterization. In: 23rd European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (ESANN’15)

  33. Payen A, Journaux L, Delion C, Sautot L, Faivre B (2015) Efficient unsupervised clustering for spatial bird population analysis along the loire river. In: 23rd European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (ESANN’15)

  34. Maaten Lvd, Hinton G (2008) Visualizing data using t-sne. J Mach Learn Res 9(Nov):2579–2605

    MATH  Google Scholar 

  35. Camastra F, Vinciarelli A (2002) Estimating the intrinsic dimension of data with a fractal-based method. IEEE Trans Pattern Anal Mach Intell 24(10):1404–1407

    Article  Google Scholar 

  36. Horng S-J, Su M-Y, Chen Y-H, Kao T-W, Chen R-J, Lai J-L, Perkasa CD (2011) A novel intrusion detection system based on hierarchical clustering and support vector machines. Expert Syst Appl 38(1):306–313

    Article  Google Scholar 

  37. Toosi AN, Kahani M (2007) A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers. Comput Commun 30(10):2201–2212

    Article  Google Scholar 

  38. Xiang C, Yong PC, Meng LS (2008) Design of multiple-level hybrid classifier for intrusion detection system using bayesian clustering and decision trees. Pattern Recognit Lett 29(7):918–924

    Article  Google Scholar 

  39. Peddabachigari S, Abraham A, Grosan C, Thomas J (2007) Modeling intrusion detection system using hybrid intelligent systems. J Netw Comp Appl 30(1):114–132

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yasir Hamid.

Ethics declarations

Funding

This work is a part of my Ph.D. project and as such I haven’t recieved any funding from any agency for this work. All the expenses for carrying out for this work have been made by the authors.

Conflict of interest

Authors have declared that no competing interests exist.

Data availabity

The authors would be happy to share the data with the intreseted researchers.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hamid, Y., Sugumaran, M. A t-SNE based non linear dimension reduction for network intrusion detection. Int. j. inf. tecnol. 12, 125–134 (2020). https://doi.org/10.1007/s41870-019-00323-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41870-019-00323-9

Keywords

Navigation