[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2490428.2490453acmconferencesArticle/Chapter ViewAbstractPublication PagessecuritConference Proceedingsconference-collections
research-article

adsvm: pre-processor plug-in using support vector machine algorithm for Snort

Published: 17 August 2012 Publication History

Abstract

Anomaly detection has been considered as a critical problem in any application area. In computer networks, anomaly detection is important as any kind of abnormal behavior in the network data is considered harmful to the end user. Snort is an open source NIDS tool that uses misuse detection method for intrusion detection. There are many pre-processor and detection plug-ins for Snort. Pre-processor plug-ins is meant to process the packet captured but some are meant for detection of anomalies also. Hence we are implementing a pre-processor plug-in for Snort meant for anomaly detection approach using the machine learning algorithm support vector machine and integrating into Snort. The anomalies detected by the plug-in are new compared with the anomalies detected by the available pre-processor plug-ins. Also we created an intrusion detection dataset which is important for any process using the machine learning algorithms. The detection rate of the plug-in is high and the false alarm rate is low which is very important for any anomaly detection system. Hence integrating this plug-in into Snort helps to improve the detection rate of the plug-ins that can be run in packet sniffer mode.

References

[1]
Martin Roesch, "Snort -- Light weight Intrusion Detection for Networks", Proceedings of lisa '99: 13th systems administration conference, Seattle, Washington, USA, November 7--12, 1999
[2]
Pavel Laskov, Konrad RIECK and Klaus-Robert MÜLLER, "Machine Learning for Intrusion Detection", a Fraunhofer Institute FIRST.IDA, University of Tübingen, Wilhelm-Schickard-Institute for Computer Science Technical University of Berlin
[3]
zhangxue-qin, gu chun-hua and linjia-jun," Intrusion detection system based on feature selection and support vector machine", east china university of science and technology
[4]
Brian Eugene, Lavender B. S." Implementation Of Genetic Algorithms Into A Network Intrusion Detection System (Netga), And Integration Into Nprobe", California Polytechnic State University, San Luis Obispo, 1993
[5]
Kamran Shafi, Hussein A. Abbass, "A Methodology to Evaluate Supervised Learning Algorithms for Intrusion Detection", Weiping Zhu School of Engineering and Information Technology (SEIT) Univiersity of New South Wales, Australian Defence Force Academy, Canberra ACT 2600
[6]
Chin-Jen Lin, Formulations of Support Vector Machines: A Note from an Optimization Point of View, Department of Computer Science and Information Engineering, National Taiwan University
[7]
Philippe Bogaerts, Alias Xxradar, "HPING Tutorial "By. Version 1.5 24-08-2003.
[8]
Detecting The Unknown With Snort And The Statistical Packet Anomaly Detection Engine (Spade)Simon Biles Computer Security Online Ltd.
[9]
Chih-Wei Hsu, Chih-Chung Chang, and Chih-Jen Lin, "A Practical Guide to Support Vector Classification", Department of Computer Science, National Taiwan University, Taipei 106, Taiwan

Cited By

View all
  • (2018)Fuzzy-Based Machine Learning Algorithm for Intelligent SystemsData Management, Analytics and Innovation10.1007/978-981-13-1402-5_25(321-339)Online publication date: 10-Aug-2018

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
SecurIT '12: Proceedings of the First International Conference on Security of Internet of Things
August 2012
266 pages
ISBN:9781450318228
DOI:10.1145/2490428
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 August 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. anomaly detection
  2. intrusion detection data set
  3. snort
  4. support vector machine

Qualifiers

  • Research-article

Conference

SECURIT '12
Sponsor:

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 07 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2018)Fuzzy-Based Machine Learning Algorithm for Intelligent SystemsData Management, Analytics and Innovation10.1007/978-981-13-1402-5_25(321-339)Online publication date: 10-Aug-2018

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media