{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T01:07:48Z","timestamp":1773796068098,"version":"3.50.1"},"reference-count":15,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,1]]},"abstract":"<jats:p>The objective of this article is to develop an intrusion detection model aimed at distinguishing attacks in the network. The aim of building IDS relies on upon preprocessing of intrusion data, choosing most relevant features and in the plan of an efficient learning algorithm that properly groups the normal and malicious examples. In this experiment, the detection model uses an ensemble approach of supervised (SVM) and unsupervised (K-Means) to detect the patterns. This technique first divides the data and forms two clusters as per K-Means and labels the clusters using the Support Vector Machine (SVM). The parameters of K-Means and SVM are tuned and optimized using an intrusion dataset. The SVM provides up to 88%, and K-Means provides up to 83% accuracy individually. However, the ensemble of K-Means and SVM provides more than 99% on three benchmarked datasets in less time. The SVM only classifies three instances of each cluster randomly and labels them as per a majority voting approach. The proposed approach outperforms compared to earlier ensemble approaches on intrusion datasets.<\/jats:p>","DOI":"10.4018\/ijitwe.2019010104","type":"journal-article","created":{"date-parts":[[2018,10,31]],"date-time":"2018-10-31T20:07:39Z","timestamp":1541016459000},"page":"66-84","source":"Crossref","is-referenced-by-count":23,"title":["An SVM-Based Ensemble Approach for Intrusion Detection"],"prefix":"10.4018","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7887-2261","authenticated-orcid":true,"given":"Santosh Kumar","family":"Sahu","sequence":"first","affiliation":[{"name":"Advanced Information Security Lab, National Institute of Technology, Rourkela, India"}]},{"given":"Akanksha","family":"Katiyar","sequence":"additional","affiliation":[{"name":"Gurukul Kangri Vishwavidyalaya, Dehradun, India"}]},{"given":"Kanchan Mala","family":"Kumari","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Central University of Haryana, Mahendragarh, India"}]},{"given":"Govind","family":"Kumar","sequence":"additional","affiliation":[{"name":"School of Computer Science and Informatics, Central University of Haryana, Mahendragarh, India"}]},{"given":"Durga Prasad","family":"Mohapatra","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, National Institute of Technology, Rourkela, India"}]}],"member":"2432","reference":[{"key":"IJITWE.2019010104-0","unstructured":"ALDAPA research group. (2008). GureKDDC Dataset [Data file]. Retrieved from http:\/\/www.sc.ehu.es\/acwaldap\/gureKddcup\/"},{"key":"IJITWE.2019010104-1","first-page":"573","article-title":"Analysis of Intrusion Detection Dataset NSL-KDD Using KNIME Analytics.","author":"M.Arafat","year":"2018","journal-title":"International Conference on Cyber Warfare and Security"},{"key":"IJITWE.2019010104-2","unstructured":"Dietterich, T. G. (2002). Ensemble Learning. In The Handbook of Brain Theory and Neural Networks (2nd ed., pp. 110-125). Cambridge, MA: The MIT Press."},{"key":"IJITWE.2019010104-3","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2018.02.003"},{"key":"IJITWE.2019010104-4","unstructured":"Gartner. (2017). Security Risks Drive Growth in Overall Security Spending. Egham, UK: Rob van der Meulen."},{"key":"IJITWE.2019010104-5","unstructured":"Mirsky, Y., Doitshman, T., Elovici, Y., & Shabtai, A. (in press). Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection. arXiv:1802.09089"},{"key":"IJITWE.2019010104-6","first-page":"20","article-title":"Analysis of KDD\u201999 intrusion detection dataset for selection of relevance features.","author":"A. A.Olusola","year":"2010","journal-title":"Proceedings of the World Congress on Engineering and Computer Science"},{"key":"IJITWE.2019010104-7","first-page":"171","article-title":"Service-independent payload analysis to improve intrusion detection in network traffic.","author":"I.Perona","year":"2008","journal-title":"Proceedings of the 7th Australasian Data Mining Conference"},{"issue":"3","key":"IJITWE.2019010104-8","first-page":"207","article-title":"A study of K-Means and C-Means clustering algorithms for intrusion detection product development.","volume":"5","author":"S. K.Sahu","year":"2014","journal-title":"International Journal of Innovation, Management and Technology"},{"key":"IJITWE.2019010104-9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-28034-9_23"},{"key":"IJITWE.2019010104-10","doi-asserted-by":"publisher","DOI":"10.4018\/IJKDB.2017010105"},{"key":"IJITWE.2019010104-11","doi-asserted-by":"publisher","DOI":"10.1109\/IAdCC.2014.6779523"},{"key":"IJITWE.2019010104-12","unstructured":"The UCI KDD Archive Information and Computer Science University of California. Irvine. (1999). KDDCup99 Dataset [Data file]. Retrieved from http:\/\/kdd.ics.uci.edu\/databases\/ kddcup99\/"},{"issue":"1","key":"IJITWE.2019010104-13","first-page":"649","article-title":"Implementation of Improved K-Mean Algorithm for Intrusion Detection System to Improve the Detection Rate. International Journal of Scientific Research in Computer Science","volume":"3","author":"S. K.Tiwari","year":"2018","journal-title":"Engineering and Information Technology"},{"key":"IJITWE.2019010104-14","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-7512-4_44"}],"container-title":["International Journal of Information Technology and Web Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=217695","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,5]],"date-time":"2022-05-05T19:55:57Z","timestamp":1651780557000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJITWE.2019010104"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":15,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.4018\/ijitwe.2019010104","relation":{},"ISSN":["1554-1045","1554-1053"],"issn-type":[{"value":"1554-1045","type":"print"},{"value":"1554-1053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1]]}}}