Table of Contents Author Guidelines Submit a Manuscript
Journal of Electrical and Computer Engineering
Volume 2016, Article ID 3095971, 6 pages
http://dx.doi.org/10.1155/2016/3095971
Research Article

SVM Intrusion Detection Model Based on Compressed Sampling

1College of Computer and Information Science, Southwest University, Chongqing 400715, China
2Chongqing City Management Vocational College, Chongqing 400055, China

Received 2 October 2015; Accepted 20 January 2016

Academic Editor: Michele Vadursi

Copyright © 2016 Shanxiong Chen et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. A. P. Lauf, R. A. Peters, and W. H. Robinson, “A distributed intrusion detection system for resource-constrained devices in ad-hoc networks,” Ad Hoc Networks, vol. 8, no. 3, pp. 253–266, 2010. View at Publisher · View at Google Scholar · View at Scopus
  2. S. Raza, L. Wallgren, and T. Voigt, “SVELTE: Real-time intrusion detection in the Internet of Things,” Ad Hoc Networks, vol. 11, no. 8, pp. 2661–2674, 2013. View at Publisher · View at Google Scholar · View at Scopus
  3. T. Zhang, E. Lee, and J. K. Seo, “Anomaly depth detection in trans-admittance mammography: a formula independent of anomaly size or admittivity contrast,” Inverse Problems, vol. 30, no. 4, Article ID 045003, 2014. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  4. D.-S. Pham, S. Venkatesh, M. Lazarescu, and S. Budhaditya, “Anomaly detection in large-scale data stream networks,” Data Mining and Knowledge Discovery, vol. 28, no. 1, pp. 145–189, 2014. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  5. R. Puzis, M. Tubi, Y. Elovici, C. Glezer, and S. Dolev, “A decision support system for placement of intrusion detection and prevention devices in large-scale networks,” ACM Transactions on Modeling and Computer Simulation, vol. 22, no. 1, 2011. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  6. S. Chen, S. Wu, Y. Cao, and D. Tang, “An intrusion detection model based on non-negative matrix factorization,” Applied Mechanics and Materials, vol. 148-149, pp. 895–899, 2012. View at Publisher · View at Google Scholar · View at Scopus
  7. V. Chandola, A. Banerjee, and V. Kumar, “Anomaly detection: a survey,” ACM Computing Surveys, vol. 41, no. 3, article 15, 2009. View at Publisher · View at Google Scholar · View at Scopus
  8. J. Haupt, W. U. Bajwa, G. Raz, and R. Nowak, “Toeplitz compressed sensing matrices with applications to sparse channel estimation,” IEEE Transactions on Information Theory, vol. 56, no. 11, pp. 5862–5875, 2010. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  9. L. B. Montefusco, D. Lazzaro, S. Papi, and C. Guerrini, “A fast compressed sensing approach to 3D MR image reconstruction,” IEEE Transactions on Medical Imaging, vol. 30, no. 5, pp. 1064–1075, 2011. View at Publisher · View at Google Scholar · View at Scopus
  10. Y. Wiaux, G. Puy, and P. Vandergheynst, “Compressed sensing reconstruction of a string signal from interferometric observations of the cosmic microwave background,” Monthly Notices of the Royal Astronomical Society, vol. 402, no. 4, pp. 2626–2636, 2010. View at Publisher · View at Google Scholar · View at Scopus
  11. F. Bonavolontà, M. D'Apuzzo, A. Liccardo, and G. Miele, “Harmonic and interharmonic measurements through a compressed sampling approach,” Measurement, vol. 77, pp. 1–15, 2016. View at Publisher · View at Google Scholar · View at Scopus
  12. D. L. Donoho, “Compressed sensing,” IEEE Transactions on Information Theory, vol. 52, no. 4, pp. 1289–1306, 2006. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  13. D. L. Donoho, A. Maleki, and A. Montanari, “The noise-sensitivity phase transition in compressed sensing,” IEEE Transactions on Information Theory, vol. 57, no. 10, pp. 6920–6941, 2011. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  14. R. Bhargavi and V. Vaidehi, “Semantic intrusion detection with multisensor data fusion using complex event processing,” Sadhana—Academy Proceedings in Engineering Sciences, vol. 38, no. 2, pp. 169–185, 2013. View at Publisher · View at Google Scholar · View at Scopus
  15. W. J. An and M. G. Liang, “A new intrusion detection method based on SVM with minimum within-class scatter,” Security and Communication Networks, vol. 6, no. 9, pp. 1064–1074, 2013. View at Publisher · View at Google Scholar · View at Scopus
  16. E. J. Candès, “The restricted isometry property and its implications for compressed sensing,” Comptes Rendus Mathematique, vol. 346, no. 9-10, pp. 589–592, 2008. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  17. K. Takeda and Y. Kabashima, “Statistical mechanical assessment of a reconstruction limit of compressed sensing: toward theoretical analysis of correlated signals,” EPL, vol. 95, no. 1, Article ID 18006, 2011. View at Publisher · View at Google Scholar · View at Scopus
  18. L. Zelnik-Manor, K. Rosenblum, and Y. C. Eldar, “Sensing matrix optimization for block-sparse decoding,” IEEE Transactions on Signal Processing, vol. 59, no. 9, pp. 4300–4312, 2011. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  19. Y. Zhao, Y. H. Hu, and H. Wang, “Enhanced random equivalent sampling based on compressed sensing,” IEEE Transactions on Instrumentation and Measurement, vol. 61, no. 3, pp. 579–586, 2012. View at Publisher · View at Google Scholar · View at Scopus
  20. E. J. Candes and Y. Plan, “A probabilistic and RIPless theory of compressed sensing,” IEEE Transactions on Information Theory, vol. 57, no. 11, pp. 7235–7254, 2011. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus