Volume 4, Issue 5-1, October 2015, Page: 28-32
An Approach for Intrusion Detection of IPv6 Network Based on LS-SVM Algorithm
Liu Jing, College of Mathematics and Information Science, Weinan Normal University, Weinan, P. R. China; Research Center of Weinan Wisdom City Engineering Technology, Weinan Normal University, Weinan, P. R. China
Received: Jul. 8, 2015;       Accepted: Jul. 14, 2015;       Published: Jul. 29, 2015
DOI: 10.11648/j.pamj.s.2015040501.16      View  3870      Downloads  119
IPv6 has enough IP addresses to solve the problem of lack of IP address space. However, there are many security problems to be concerned. The detection ability of current intrusion detection system is poor when given less priori knowledge. In this paper, we analyze the Least Squares Support Vector Machine (LS-SVM) algorithm and the working process of snort intrusion detection system. And then we study the methods of intrusion detection in IPv6, and use LS-SVM to optimize snort intrusion detection system. Simulation results show that intrusion detection system with LS-SVM has a robust performance and has high detection efficiency
Intrusion Detection, Least Squares Support Vector Machine, IPv6, Snort
To cite this article
Liu Jing, An Approach for Intrusion Detection of IPv6 Network Based on LS-SVM Algorithm, Pure and Applied Mathematics Journal. Special Issue: Mathematical Aspects of Engineering Disciplines. Vol. 4, No. 5-1, 2015, pp. 28-32. doi: 10.11648/j.pamj.s.2015040501.16
Qing SH, “research on intrusion detection techniques: a survey”, JOURNAL OF CHINA INSTITUTE OF COMMUNICATIONS, 25(2004), 19-29.
KUMAR S, Classification and Detection of Computer Intrusions, Dissertation, Purdue University, 1995.
Gomathy, A., and B. Lakshmipathi. “Network intrusion detection using Genetic algorithm and Neural Network” Advances in Computing and Information Technology, Springer Berlin Heidelberg, (2011), 399-408.
The open source network intrusion detection system [EB/OL],
Suykens J A K, Vandewalle J, “Least Squares Support Vector Machine Classifiers”, Neural Processing Letters, 9(3)( 1999),293-300.
P.H. Chen, R.E. Fan, and C.J. Lin, A study on SMO-type decomposition methods or support vector machines. IEEE Transactions on Neural Networks,(2006).
J.A.K.Suykens, T.Van Gestel, J.De Brabanter, B.De Moor, J.Vandewalle, “Least Squares Support Vector Machines”.Singapore: World Scientific publishing,(2002).
Suykens J A K, Vandewalle, De Moor B, Optimal Control by Least Squares Support Vector Machines. Neural Networks,14(1)( 2001),23-35.
Wang, Haifeng, and Dejin Hu, “Comparison of SVM and LS-SVM for regression”, Neural Networks and Brain (2005).
Friedman J H., “Another Approach to Polychotomous Classification”, Technical Report. Standford University. Depart-ment of Statistics,10(1998),1895-1924.
Deering S,Hinden R, Internet Protocol Version 6 (IPv6) Specification, IETF,12(1995).
Andrew R. Baker,Joel Esler, “Snort Intrusion Detection and Prevention Toolkit” ,Syngress Publishing, Inc.,(2007).
Martin Roesch,Chris Green,Sourcefire. SNORT Users Manual 2.9.4,11(2012).
Erana, E. I. and Scheffer, T. “IPv6 Intrusion De-tection mit Snort”, In Forschungsbericht der Beuth Hochschule fur Technik Berlin, Beuth Verlag GmbH Berlin-Wien-Zurich (2010).
Hogg, S. and Vyncke, E., IPv6 Security. Cisco Press, Indianapolis, IN 46240 USA.,(2009).
Loshin, Pete. “IPv6: Theory, Protocol, and Practice”. San Fransisco: Morgan Kaufmann Publishers, (2003).
Kent S.IP encapsulating security payload (ESP), RFC4203 [EB/OL]. http://www.ietf. org/rfc/rfc4203.txt,(2005).
K. Pelckmans, J.A.K. Suykens, T. Van Gestel,, Vandewalle, LS-SVMlab Toolbox User’s Guide.
KDD Cup 99 DATA.
Browse journals by subject