Corpus ID: 18226230

Robust Support Vector Machines for Anomaly Detection in Computer Security

  title={Robust Support Vector Machines for Anomaly Detection in Computer Security},
  author={W. Hu and Y. Liao and V. Vemuri},
  • W. Hu, Y. Liao, V. Vemuri
  • Published in ICMLA 2003
  • Computer Science
  • Using the 1998 DARPA BSM data set collected at MIT’s Lincoln Labs to study intrusion detection systems, the performance of robust support vector machines (RVSMs) was compared with that of conventional support vector machines and nearest neighbor classifiers in separating normal usage profiles from intrusive profiles of computer programs. [...] Key Result The results indicate the superiority of RSVMs not only in terms of high intrusion detection accuracy and low false positives but also in terms of their…Expand Abstract
    179 Citations

    Figures, Tables, and Topics from this paper.

    Biased Support Vector Machines and Kernel Methods for Intrusion Detection
    • 3
    • PDF
    Online training of SVMs for real-time intrusion detection
    • Z. Zhang, Hong Shen
    • Computer Science
    • 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.
    • 2004
    • 41
    • Highly Influenced
    Machine Learning Applications in Misuse and Anomaly Detection
    The practice on using machine learning for network anomaly intrusion detection
    • Yu-Xin Meng
    • Computer Science
    • 2011 International Conference on Machine Learning and Cybernetics
    • 2011
    • 31
    Network Intrusion Detection Based on Improved Proximal SVM
    • 8
    • PDF
    Meta Learning Intrusion Detection in Real Time Network
    • 3


    Intrusion detection. Applying machine learning to Solaris audit data
    • D. Endler
    • Computer Science
    • Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)
    • 1998
    • 123
    A Study in Using Neural Networks for Anomaly and Misuse Detection
    • 449
    • PDF
    An Application of Machine Learning to Anomaly Detection
    • 208
    • PDF
    Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation
    • 926
    • PDF
    Use of K-Nearest Neighbor classifier for intrusion detection
    • 494
    • PDF
    Towards a taxonomy of intrusion-detection systems
    • 842
    • PDF
    Detecting intrusions using system calls: alternative data models
    • 1,193
    • PDF
    A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems
    • 452
    • PDF
    Learning Program Behavior Profiles for Intrusion Detection
    • 478
    • PDF