JOURNAL ARTICLE

Network based anomaly intrusion detection system using SVM

J. Arokia Renjit

Year: 2011 Journal:   Indian Journal of Science and Technology Vol: 4 (9)Pages: 1105-1108   Publisher: Indian Society for Education and Environment

Abstract

The security and integrity of a computer system is compromised when an intrusion occurs. It becomes impossible for legitimate users to access different network services when network-based attacks purposely occupy or sabotage network resources and services. Our proposed method is a scalable detection method for network based anomalies. We use Support Vector Machines (SVM) for classification. This paper presents a method for enhancing the training time of SVM, particularly when dealing with large data sets, using hierarchical clustering technique. We use the Dynamically Growing Self-Organizing Tree (DGSOT) algorithm for clustering because it has proved to overcome the problems of traditional hierarchical clustering algorithms (e.g., hierarchical agglomerative clustering). Clustering analysis helps to find the boundary points, which are the most qualified data points to train SVM, between any two classes. We present a new approach of combination of SVM and DGSOT, which begins with an initial training set and expands it gradually using the clustering structure produced by the DGSOT algorithm. We show that our proposed variations contribute significantly in improving the training process of SVM with high percentage of detection accuracy. Keywords: SVM, classification, Intrusion detection, Intrusion detection System, Network Security

Keywords:
Computer science Support vector machine Cluster analysis Intrusion detection system Data mining Network security Anomaly detection Hierarchical clustering Anomaly-based intrusion detection system Artificial intelligence Pattern recognition (psychology) Machine learning Computer security

Metrics

9
Cited By
0.73
FWCI (Field Weighted Citation Impact)
10
Refs
0.70
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
Spam and Phishing Detection
Physical Sciences →  Computer Science →  Information Systems
Anomaly Detection Techniques and Applications
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

JOURNAL ARTICLE

Anomaly Based Network Intrusion Detection System Using ML

Suchethana H. C.Monika B. GoudaVarshini S.Pranati B.Vanyashree R. Naik

Journal:   International journal of research and scientific innovation Year: 2026 Vol: 12 (13)Pages: 202-219
JOURNAL ARTICLE

Anomaly-Based Network Intrusion Detection System

Anil Kumar VermaEnish PaneruBishal Baaniya

Journal:   Journal of Lumbini Engineering College Year: 2022 Vol: 4 (1)Pages: 38-42
JOURNAL ARTICLE

Network Intrusion Detection System using 2D Anomaly Detection

Min Seok KimJong Hoon ShinChoong Seon Hong

Journal:   2022 23rd Asia-Pacific Network Operations and Management Symposium (APNOMS) Year: 2022 Pages: 1-4
© 2026 ScienceGate Book Chapters — All rights reserved.