Application of Relevance Vector Machines in Real Time Intrusion Detection

Abstract

In the recent years, there has been a growing interest in the development of change detection techniques for the analysis of Intrusion Detection. This interest stems from the wide range of applications in which change detection methods can be used. Detecting the changes by observing data collected at different times is one of the most important applications of network security because they can provide analysis of short interval on global scale. Research in exploring change detection techniques for medium/high network data can be found for the new generation of very high resolution data. The advent of these technologies has greatly increased the ability to monitor and resolve the details of changes and makes it possible to analyze. At the same time, they present a new challenge over other technologies in that a relatively large amount of data must be analyzed and corrected for registration and classification errors to identify frequently changing trend. In this research paper an approach for Intrusion Detection System (IDS) which embeds a Change Detection Algorithm with Relevance Vector Machine (RVM) is proposed. IDS are considered as a complex task that handles a huge amount of network related data with different parameters. Current research work has proved that kernel learning based methods are very effective in addressing these problems. In contrast to Support Vector Machines (SVM), the RVM provides a probabilistic output while preserving the accuracy. The focus of this paper is to model RVM that can work with large network data set in a real environment and develop RVM classifier for IDS. The new model consists of Change Point (CP) and RVM which is competitive in processing time and improve the classification performance compared to other known classification model like SVM. The goal is to make the system simple but efficient in detecting network intrusion in an actual real time environment. Results show that the model learns more effectively, automatically adjust to the changes and adjust the threshold while minimizing the false alarm rate with timely detection.

Authors and Affiliations

Naveen C, Dr Natarajan. S, Dr Srinivasan. R

Keywords

Related Articles

Impact of Distributed Generation on the Reliability of Local Distribution System

With the growth of distributed generation (DG) and renewable energy resources the power sector is becoming more sophisticated, distributed generation technologies with its diverse impacts on power system is becoming attr...

InstDroid: A Light Weight Instant Malware Detector for Android Operating Systems

With the increasing popularity of Android operating system, its security concerns have also been raised to a new horizon in past few years. Different researchers have introduced different approaches in order to mitigate...

A Robust System for Noisy Image Classification Combining Denoising Autoencoder and Convolutional Neural Network

Image classification, a complex perceptual task with many real life important applications, faces a major challenge in presence of noise. Noise degrades the performance of the classifiers and makes them less suitable in...

LSSCW: A Lightweight Security Scheme for Cluster based Wireless Sensor Network

In last two decades, Wireless Sensor Network (WSN) is used for large number of Internet of Things (IoT) applications, such as military surveillance, forest fire detection, healthcare, precision agriculture and smart home...

Identifying Dynamic Topics of Interest across Social Networks

Information propagation plays a significant role in online social networks, mining the latent information produced became crucial to understand how information is disseminated. It can be used for market prediction, rumor...

Download PDF file
  • EP ID EP150976
  • DOI -
  • Views 86
  • Downloads 0

How To Cite

Naveen C, Dr Natarajan. S, Dr Srinivasan. R (2012). Application of Relevance Vector Machines in Real Time Intrusion Detection. International Journal of Advanced Computer Science & Applications, 3(9), 48-53. https://europub.co.uk/articles/-A-150976