location:Home > 2018 Vol.1 Dec. No.6 > Research on campus network malicious attack detection method

2018 Vol.1 Dec. No.6

  • Title: Research on campus network malicious attack detection method
  • Name: Gustaver Patrickor
  • Company: Tairawhiti Polytechinc
  • Abstract:

    The problem of malicious attacks detection on campus network is studied to improve the accuracy of detection. When detecting malicious attacks on campus network, a conventional manner is usually conducted in malicious attack detection of campus network. If a malicious signature is mutated into a new feature, the conventional detection method cannot recognize the new malicious signature, resulting in a relative low detection accuracy rate of malicious attacks. To avoid these problems, in this paper, the malicious attacks detection method for campus network based on support vector machine algorithm is proposed. The plane of support vector machine classification is constructed, to complete the malicious attacks detection of campus network. Experiments show that this approach can improve the accuracy rate of the malicious attack detection, and achieve satisfactory results.

  • Keyword: Malicious Attacks; Campus Network; Support Vector Machine;
  • DOI: 10.12250/jpciams2018060117
  • Citation form: Gustaver Patrickor.Research on campus network malicious attack detection method [J]. Computer Informatization and Mechanical System, 2018, vol. 1, pp. 1-3.
Reference:

[1] D. Subhadrabandhu, F. Anjum, and S. Sarkar. On optimal placement of intrusion detection modules in sensor networks[C]. Proceedings of the First International Conference on Broadband Networks, 2004: 690-699. 

[2] Anjum F, Subhadrabandhu D, Sarkar S, et al. On Optimal Placement of Intrusion Detection Modules in Sensor Networks[C]. 1st International Conference on Broadband Networks. Washington: IEEE Press, 2004: 433–439. 

[3] O.Chapelle,V. Vapnik. Choosing multiple parameters for support vector machines. [J] Machine Learning,2002,46:131-159. 

[4] Zhang Haichun, Li Yuan, Zhang Zili. Design and Simulation of the System for Intelligent Intrusion Detection [J]. Mathematics in practice and theory,2009,39(6):162-169.

[5] Wang Zhongcai, Li Yongbi. Intrusion Detection System Based on Data Mining Research [J]. Bulletin of Science and Technology, 2012, 28(8): 150-152.

[6] Dai Tianhong, Wang Keqi, Yang Shaochun. Intrusion Detection Research Based on Support Vector Machine [J]. China safety science journal, 2008, 18(4):126-130.


Tsuruta Institute of Medical Information Technology
Address:[502,5-47-6], Tsuyama, Tsukuba, Saitama, Japan TEL:008148-28809 fax:008148-28808 Japan,Email:jpciams@hotmail.com,2019-09-16