Improving security using SVM-based anomaly detection: issues and challenges

  • PDF / 3,830,559 Bytes
  • 29 Pages / 595.276 x 790.866 pts Page_size
  • 24 Downloads / 271 Views

DOWNLOAD

REPORT


(0123456789().,-volV)(0123456789().,-volV)

METHODOLOGIES AND APPLICATION

Improving security using SVM-based anomaly detection: issues and challenges Mehdi Hosseinzadeh1,2 • Amir Masoud Rahmani3 • Bay Vo4 • Moazam Bidaki5 • Mohammad Masdari6 Mehran Zangakani7



 Springer-Verlag GmbH Germany, part of Springer Nature 2020

Abstract Security is one of the main requirements of the current computer systems, and recently it gains much importance as the number and severity of malicious attacks increase dramatically. Anomaly detection is one of the main branches of the intrusion detection systems which enables to recognize the newer variants of the security attacks. This paper focuses on the anomaly detection schemes (ADS), which have applied support vector machine (SVM) for detecting intrusions and security attacks. For this purpose, it first presents the required concepts about the SVM classifier and intrusion detection systems. It then classifies the ADS approaches and discusses the various machine learning and artificial intelligence techniques that have been applied in combination with the SVM classifier to detect anomalies. Besides, it specifies the primary capabilities, possible limitations, or advantages of the ADS approaches. Furthermore, a comparison of the studied ADS schemes is provided to illuminate their various technical details. Keywords SVM  Multiclass SVM  Anomaly intrusion detection  Feature selection  Security  PCA

Communicated by V. Loia. 4

Faculty of Information Technology, Ho Chi Minh City University of Technology (HUTECH), Ho Chi Minh City, Vietnam

Mehdi Hosseinzadeh [email protected]

5

Computer Engineering Department, Urmia Branch, Islamic Azad University, Urmia, Iran

Amir Masoud Rahmani [email protected]

6

Department of Computer Engineering, Neyshabur Branch, Islamic Azad University, Neyshabur, Iran

Moazam Bidaki [email protected]

7

Afagh Higher Education Institute, Urmia, Iran

& Bay Vo [email protected]

Mohammad Masdari [email protected] Mehran Zangakani [email protected] 1

Institute of Research and Development, Duy Tan University, Da Nang 550000, Vietnam

2

Health Management and Economics Research Center, Iran University of Medical Sciences, Tehran, Iran

3

Department of Computer Science, Khazar University, Baku, Azerbaijan

123

M. Hosseinzadeh et al.

1 Introduction

classified into the following categories (Ahmed et al. 2016):

Almost all TCP/IP layers are vulnerable to some kinds of malicious behaviors and security attacks, which may be conducted by internal or external attackers (Yan et al. 2015; Singh et al. 2016). However, network hacking and attacking methods are evolving every day to keep security pressure on the computing technologies and networks such as the Internet of Things (IoT) (Qi et al. 2017; Alaba et al. 2017), wireless body area networks (WBANs) (Yessad et al. 2018; Masdari et al. 2017), eHealthcare systems (Yaseen et al. 2018; Masdari and Ahmadzadeh 2017), and cloud computing (Ghomi et al. 2017; Masdari and Zang