Open Access
Subscription Access
Open Access
Subscription Access
A Comprehensive Survey on Support Vector Machines for Intrusion Detection System
Subscribe/Renew Journal
Machine learning is a widely interdisciplinary field centered on theories from cognitive science, computer science, statistics, optimization and many other theoretical and mathematical disciplines. Classification is a supervised learning technique used in machine learning to evaluate a given dataset and to create a model that divides data into a desired and distinct number of groups. The strength of SVMs lies in their use of nonlinear kernel features that map input into high-dimensional spaces of features implicitly. We’ll address the value of SVMs in this survey article. Discussing their SVM tuning parameters as well. The main purpose of this paper is to include detailed studies on SVM implementations by contrasting the current ML models with the SVM versions, also poses the problems of the intrusion detection method of the support vector machines, and also this paper provides researchers with a summary of the SVM that assists in their future analysis.
Keywords
Data Mining (DM), Intrusion Detection System (IDS), Machine Learning (ML), Optimization, Support Vector Machines (SVMs).
Subscription
Login to verify subscription
User
Font Size
Information
- J. Cervantes, F. Garcia-Lamont, L. Rodríguez-Mazahua, and A. Lopez, “A comprehensive survey on support vector machine classification: Applications, challenges and trends,” Neurocomputing, 2020, doi: 10.1016/j.neucom.2019.10.118.
- S. Ghosh, A. Dasgupta, and A. Swetapadma, “A study on support vector machine based linear and non-linear pattern classification,” Proc. Int. Conf. Intell. Sustain. Syst. ICISS 2019, no. Iciss, 2019, pp. 24-28, doi: 10.1109/ISS1.2019.8908018.
- Q. Yang, H. Fu, and T. Zhu, “An optimization method for parameters of SVM in network intrusion detection system,” Proc. - 12th Annu. Int. Conf. Distrib. Comput. Sens. Syst. DCOSS 2016, 2016, pp. 136-142, doi: 10.1109/DCOSS.2016.48.
- I. Rebai, Y. BenAyed, and W. Mahdi, “Deep kernel-SVM network,” 2016 International Joint Conference on Neural Networks (IJCNN), Vancouver, BC, Canada, 2016, pp. 1955-1960.
- A. A. Aburomman, and M. B. I. Reaz, “Ensemble of binary SVM classifiers based on PCA and LDA feature extraction for intrusion detection,” Proc. 2016 IEEE Adv. Inf. Manag. Commun. Electron. Autom. Control Conf. IMCEC 2016, 2016, pp. 636-640, doi: 10.1109/IMCEC.2016.7867287.
- D. Liang, Q. Liu, B. Zhao, Z. Zhu, and D. Liu, “A clustering-SVM ensemble method for intrusion detection system,” 2019 8th Int. Symp. Next Gener. Electron. ISNE 2019, vol. 2, no. 2, pp. 1-3, 2019, doi: 10.1109/ISNE.2019.8896514.
- M. Safaldin, M. Otair, and L. Abualigah, “Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks,” J. Ambient Intell. Humaniz. Comput., 2020, Art. no. 0123456789, doi: 10.1007/s12652-020-02228-z.
- H. Wang, J. Gu, and S. Wang, “An effective intrusion detection framework based on SVM with feature augmentation,” Knowledge-Based Syst., vol. 136, pp. 130-139, 2017, doi: 10.1016/j.knosys.2017.09.014.
- M. Al-Qatf, Y. Lasheng, M. Al-Habib, and K. Al-Sabahi, “Deep learning approach combining sparse autoencoder with SVM for network intrusion detection,” IEEE Access, vol. 6, no. c, pp. 52843-52856, 2018, doi: 10.1109/ACCESS.2018.2869577.
- J. Gu, L. Wang, H. Wang, and S. Wang, “A novel approach to intrusion detection using SVM ensemble with feature augmentation,” Comput. Secur., vol. 86, pp. 53-62, 2019, doi: 10.1016/j.cose.2019.05.022.
- A. I. Saleh, F. M. Talaat, and L. M. Labib, “A hybrid intrusion detection system (HIDS) based on prioritized k-nearest neighbors and optimized SVM classifiers,” Artif. Intell. Rev., vol. 51, no. 3, pp. 403-443, 2019, doi: 10.1007/s10462-017-9567-1.
- P. Tao, Z. Sun, and Z. Sun, “An improved intrusion detection algorithm based on GA and SVM,” IEEE Access, vol. 6, pp. 13624-13631, 2018, doi: 10.1109/ACCESS.2018.2810198.
- E. Kabir, J. Hu, H. Wang, and G. Zhuo, “A novel statistical technique for intrusion detection systems,” Futur. Gener. Comput. Syst., vol. 79, pp. 303-318, 2018, doi: 10.1016/j.future.2017.01.029.
- G. Kavitha, and N. M. Elango, “An approach to feature selection in intrusion detection systems using machine learning algorithms,” Int. J. e-Collaboration, vol. 16, no. 4, pp. 48-58, 2020, doi: 10.4018/IJeC.2020100104.
- A. Al Shorman, H. Faris, and I. Aljarah, “Unsupervised intelligent system based on one class support vector machine and grey wolf optimization for IoT botnet detection,” J. Ambient Intell. Humaniz. Comput., vol. 11, no. 7, pp. 2809-2825, 2020, doi: 10.1007/s12652-019-01387-y.
- E. M. Roopa Devi, and R. C. Suganthe, “Enhanced transductive support vector machine classification with grey wolf optimizer cuckoo search optimization for intrusion detection system,” Concurr. Comput., vol. 32, no. 4, pp. 1-11, 2020, doi: 10.1002/cpe.4999.
- S. N. Mighan, and M. Kahani, “A novel scalable intrusion detection system based on deep learning,” Int. J. Inf. Secur., 2020, Art. no. 0123456789, doi: 10.1007/s10207-020-00508-5.
- D. V. Kumar, and V. Ramasamy, “Improved intrusion detection classifier using cuckoo search optimization with support vector machine,” ICTACT J. Soft Comput., vol. 10, no. 2, pp. 2029-2034, 2020, doi: 10.21917/ijsc.2020.0287.
- Z. Ye, Y. Sun, S. Sun, S. Zhan, H. Yu, and Q. Yao, “Research on network intrusion detection based on support vector machine optimized with grasshopper optimization algorithm,” Proc. 2019 10th IEEE Int. Conf. Intell. Data Acquis. Adv. Comput. Syst. Technol. Appl. IDAACS 2019, vol. 1, pp. 378-383, 2019, doi: 10.1109/IDAACS.2019.8924234.
- J. Jackson, “Data mining; A conceptual overview,” Commun. Assoc. Inf. Syst., vol. 8, 2002, doi: 10.17705/1cais.00819.
- A. A. Aburomman, and M. B. I. Reaz, “A novel SVM-kNN-PSO ensemble method for intrusion detection system,” Appl. Soft Comput. J., vol. 38, pp. 360-372, 2016, doi: 10.1016/j.asoc.2015.10.011.
- X. Gao, C. Shan, C. Hu, Z. Niu, and Z. Liu, “An adaptive ensemble machine learning model for intrusion detection,” IEEE Access, vol. 7, pp. 82512-82521, 2019, doi: 10.1109/ACCESS.2019.2923640.
- R. Vinayakumar, M. Alazab, K. P. Soman, P. Poornachandran, A. Al-Nemrat, and S. Venkatraman, “Deep learning approach for intelligent intrusion detection system,” IEEE Access, vol. 7, pp. 41525-41550, 2019, doi: 10.1109/ACCESS.2019.2895334.
- K. A. P. da Costa, J. P. Papa, C. O. Lisboa, R. Munoz, and V. H. C. de Albuquerque, “Internet of things: A survey on machine learning-based intrusion detection approaches,” Comput. Networks, vol. 151, pp. 147-157, 2019, doi: 10.1016/j.comnet.2019.01.023.
- J. Ren, J. Guo, W. Qian, H. Yuan, X. Hao, and H. Jingjing, “Building an effective intrusion detection system by using hybrid data optimization based on machine learning algorithms,” Secur. Commun. Networks, vol. 2019, 2019, doi: 10.1155/2019/7130868.
- K. A. Taher, B. M. Y. Jisan, and M. M. Rahman, “Network intrusion detection using supervised machine learning technique with feature selection,” 1st Int. Conf. Robot. Electr. Signal Process. Tech. ICREST 2019, 2019, pp. 643-646, doi: 10.1109/ICREST.2019.8644161.
- S. Tavara, “Parallel computing of support vector machines: A survey,” ACM Comput. Surv., vol. 51, no. 6, 2019, doi: 10.1145/3280989.
- J. Gu, and S. Lu, “An effective intrusion detection approach using SVM with Naive Bayes feature embedding,” Comput. Secur., vol. 103, 2021, Art. no. 102158, doi: 10.1016/j.cose.2020.102158.
- M. Hosseinzadeh, A. M. Rahmani, B. Vo, M. Bidaki, M. Masdari, and M. Zangakani, “Improving security using SVM-based anomaly detection: Issues and challenges,” Soft Comput., vol. 25, pp. 3195-3223, 2021, doi: 10.1007/s00500-020-05373-x.
- F. Wang, Z. Chen, and G. Song, “Monitoring of multi-bolt connection looseness using entropy-based active sensing and genetic algorithm-based least square support vector machine,” Mech. Syst. Signal Process., vol. 136, 2020, Art. no. 106507, doi: 10.1016/j.ymssp.2019.106507.
- J. Nayak, B. Naik, and H. S. Behera, “A comprehensive survey on support vector machine in data mining tasks: Applications & challenges,” Int. J. Database Theory Appl., vol. 8, no. 1, pp. 169-186, 2015, doi: 10.14257/ijdta.2015.8.1.18.
- H. Byun, and S. W. Lee, “Applications of support vector machines for pattern recognition: A survey,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 2388, pp. 213-236, 2002, doi: 10.1007/3-540-45665-1_17.
- P. S. Thapanan Janyalikit, “Intelligent information and database systems: 8th Asian conference, ACIIDS 2016 da Nang, Vietnam, March 14-16, 2016 proceedings, Part I,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 9621, pp. 616-625, 2016, doi: 10.1007/978-3-662-49381-6.
Abstract Views: 319
PDF Views: 0