Abstract
With the increased dependence on the internet for day to day activities, the need to keep the networks secure has become more vital. The quest of securing the computer systems and networks, from the users with destructive mindset, has resulted in the invention of surfeit devices and methods. One such method against whom the responsibility of discriminating between normal and harmful data, flowing on the network is, intrusion detection system (IDS). In this work an IDS model based on support vector machines is proposed. In order to enhance the detection capability of support vector machine based model for intrusion detection, and to eliminate the inherent problem of intrusion detection i.e, low accuracy of the system in detecting user to root and remote to local attacks, this paper proposes to use recent non-linear dimension reduction technique to enhance the discrimination of the data. Results demonstrate that t-SNE based dimension reduction improve the accuracy of SVM for network intrusion detection system. A comparison of the proposed system with the previous works has proven that this work has enhanced detection rate for almost all the attack groups.
Similar content being viewed by others
References
Domingue J, Zahariadis T, Lambert D, Cleary F, Daras P, Krco S, Li M-S, Schaffers H, Lotz V, Stiller B et al (2011) The future internet. Springer, Berlin
Tsai C-F, Lin C-Y (2010) A triangle area based nearest neighbors approach to intrusion detection. Pattern Recognit 43(1):222–229
Wang G, Hao J, Ma J, Huang L (2010) A new approach to intrusion detection using artificial neural networks and fuzzy clustering. Expert Syst Appl 37(9):6225–6232
Liao Y, Vemuri VR (2005) Machine learning in intrusion detection. Enhancing Computer Security with Smart Technology, p 93
Hughes G (1968) On the mean accuracy of statistical pattern recognizers. IEEE Trans Inf Theory 14(1):55–63
Dunteman GHC (1989) Principal components analysis. Sage, no. 69
Kruskal JB, Wish M (1978) Multidimensional scaling. Sage 11
Demartines P, Hérault J (1997) Curvilinear component analysis: a self-organizing neural network for nonlinear mapping of data sets. IEEE Trans Neural Netw 8(1):148–154
Hinton GE, Roweis ST (2002) Stochastic neighbor embedding. In: Advances in neural information processing systems, pp 833–840
Lunga D, Ersoy O (2013) Spherical stochastic neighbor embedding of hyperspectral data. IEEE Trans Geosci Rem Sens 51(2):857–871
Tenenbaum JB, De Silva V, Langford JC (2000) A global geometric framework for nonlinear dimensionality reduction. Science 290(5500):2319–2323
Van Der Maaten L (2014) Accelerating t-sne using tree-based algorithms. J Mach Learn Res 15(1):3221–3245
Hearst MA, Dumais ST, Osman E, Platt J, Scholkopf B (1998) Support vector machines. IEEE Intell Syst Appl 13(4):18–28
Hamid Y, Sugumaran M, Balasaraswathi V (2016) Ids using machine learning-current state of art and future directions. Br J Appl Sci Technol 15(3)
Liao H-J, Lin C-HR, Lin Y-C, Tung K-Y (2013) Intrusion detection system: a comprehensive review. J Netw Comput Appl 36(1):16–24
Tsai C-F, Hsu Y-F, Lin C-Y, Lin W-Y (2009) Intrusion detection by machine learning: a review. Expert Syst Appl 36(10):11994–12000
Kim G, Lee S, Kim S (2014) A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Syst Appl 41(4):1690–1700
Luo B, Xia J (2014) A novel intrusion detection system based on feature generation with visualization strategy. Expert Syst Appl 41(9):4139–4147
Hamid Y, Sugumaran M, Journaux L (2016) A fusion of feature extraction and feature selection technique for network intrusion detection. Int J Secur Appl 10(8):151–158
Xia Y-X, Shi Z-C, Hu Z-H (2009) An incremental svm forintrusion detection based on key feature selection. In: Intelligent information technology application, 2009. IITA2009. Third International Symposium on IEEE, vol. 3, pp 205–208
Xie L, Zhu D, Yang H (2009) Research on svm based network intrusion detection classification. In: Fuzzy systems and knowledge discovery, 2009. FSKD’09. Sixth International Conference on IEEE
Mukkamala S, Janoski G, Sung A (2002) Intrusion detection using neural networks and support vector machines. In: Neural networks, 2002. IJCNN’02. Proceedings of the 2002 International Joint Conference on IEEE, vol. 2, pp 1702–1707
Heba FE, Darwish A, Hassanien AE, Abraham A (2010) Principle components analysis and support vector machine based intrusion detection system. In: 2010 10th international conference on intelligent systems design and applications, pp 363–367
Labib K, Vemuri VR (2006) An application of principal component analysis to the detection and visualization of computer network attacks. In: Annales des télécommunications, vol. 61, no. 1-2. Springer, pp 218–234
Kuchimanchi GK, Phoha VV, Balagani KS, Gaddam SR (2004) Dimensionreduction using feature extraction methods for real-time misusedetection systems. In: Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC, pp 195–202
Day CW (2006) Intrusion detection system using self-organizing clusters, uS Patent 7,017,186
Zanero S, Savaresi SM (2004) Unsupervised learning techniques for an intrusion detection system. In: Proceedings of the 2004 ACM symposium on Applied computing. ACM, pp 412–419
Day CW (2007) Intrusion detection system, US Patent 7,260,846
Dash SK, Rawat S, Pujari AK (2006) Lle on system calls for host based intrusion detection. In: 2006 international conference on computational intelligence and security, vol. 1, pp 609–612
Lee JA, Verleysen M (2007) Nonlinear dimensionality reduction. Springer, New York
Li Y, Wang Y, Zi Y, Zhang M (2015) An enhanced data visualization method for diesel engine malfunction classification using multi-sensor signals. Sensors 15(10):26675–26693
Delion C, Journaux L, Payen A, Sautot L, Chevigny E, Curmi P (2015) Nldr methods for high dimensional nirs dataset: application to vineyard soils characterization. In: 23rd European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (ESANN’15)
Payen A, Journaux L, Delion C, Sautot L, Faivre B (2015) Efficient unsupervised clustering for spatial bird population analysis along the loire river. In: 23rd European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (ESANN’15)
Maaten Lvd, Hinton G (2008) Visualizing data using t-sne. J Mach Learn Res 9(Nov):2579–2605
Camastra F, Vinciarelli A (2002) Estimating the intrinsic dimension of data with a fractal-based method. IEEE Trans Pattern Anal Mach Intell 24(10):1404–1407
Horng S-J, Su M-Y, Chen Y-H, Kao T-W, Chen R-J, Lai J-L, Perkasa CD (2011) A novel intrusion detection system based on hierarchical clustering and support vector machines. Expert Syst Appl 38(1):306–313
Toosi AN, Kahani M (2007) A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers. Comput Commun 30(10):2201–2212
Xiang C, Yong PC, Meng LS (2008) Design of multiple-level hybrid classifier for intrusion detection system using bayesian clustering and decision trees. Pattern Recognit Lett 29(7):918–924
Peddabachigari S, Abraham A, Grosan C, Thomas J (2007) Modeling intrusion detection system using hybrid intelligent systems. J Netw Comp Appl 30(1):114–132
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Funding
This work is a part of my Ph.D. project and as such I haven’t recieved any funding from any agency for this work. All the expenses for carrying out for this work have been made by the authors.
Conflict of interest
Authors have declared that no competing interests exist.
Data availabity
The authors would be happy to share the data with the intreseted researchers.
Rights and permissions
About this article
Cite this article
Hamid, Y., Sugumaran, M. A t-SNE based non linear dimension reduction for network intrusion detection. Int. j. inf. tecnol. 12, 125–134 (2020). https://doi.org/10.1007/s41870-019-00323-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s41870-019-00323-9