Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham, Vitorino Ramos


Past few years have witnessed a growing recognition of intelligent techniques for the construction of efficient and reliable intrusion detection systems. Due to increasing incidents of cyber attacks, building effective intrusion detection systems (IDS) are essential for protecting information systems security, and yet it remains an elusive goal and a great challenge. In this paper, we report a performance analysis between Multivariate Adaptive Regression Splines (MARS), neural networks and support vector machines. The MARS procedure builds flexible regression models by fitting separate splines to distinct intervals of the predictor variables. A brief comparison of different neural network learning algorithms is also given.


  1. Abraham A., Ramos V., 2003. Web Usage Mining Using Artificial Ant Colony and Genetic Programming, Congress on Evolutionary Computation (CEC'03), IEEE Press, pp. 1384-1391.
  2. Abraham A., Steinberg D., 2001. MARS: Still an Alien Planet in Soft Computing? International Conference on Computational Science, Springer-Verlag Germany, Lecture Notes in Computer Science 2074, pp. 235- 244.
  3. Bishop C. M., Neural Networks for Pattern Recognition, Oxford Press, 1995.
  4. Cannady J., 1998. Artificial Neural Networks for Misuse Detection. National Information Systems Security Conference.
  5. Cramer M., et. al. 1995. New Methods of Intrusion Detection using Control-Loop Measurement. Proceedings of the Technology in Information Security Conference (TISC), pp. 1-10.
  6. Debar H., Becke M., Siboni D., 1992a. A Neural Network Component for an Intrusion Detection System. Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy.
  7. Debar H., Dorizzi. B., 1992b. An Application of a Recurrent Network to an Intrusion Detection System. Proceedings of the International Joint Conference on Neural Networks, pp.78-83.
  8. Denning D., 1987. An Intrusion-Detection Model. IEEE Trans. on Software Engineering, Vol.SE-13, Nº 2.
  9. Friedman, J. H, 1991. Multivariate Adaptive Regression Splines, Annals of Statistics, Vol 19, pp. 1-141.
  10. Ghosh A. K., 1999. Learning Program Behavior Profiles for Intrusion Detection. USENIX.
  11. Joachims T., 1998. Making Large-Scale SVM Learning Practical. University of Dortmund, LS8-Report, LS VIII-Report.
  12. Joachims T., 2000. SVMlight is an Implementation of Support Vector Machines (SVMs) in C. University of Dortmund. Collaborative Research Center on Complexity Reduction in Multivariate Data (SFB475):
  13. Kendall K., 1998. A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems. Master's Thesis, Massachusetts Institute of Technology.
  14. Kumar S., Spafford E. H., 1994. An Application of Pattern Matching in Intrusion Detection. Technical Report CSD-TR-94-013, Purdue University.
  15. Lincoln Laboratory, Massachusetts Institute of Technology (MIT), 1998-2000. DARPA Intrusion Detection Evaluation:
  16. Luo J., Bridges S. M., 2000. Mining Fuzzy Association Rules and Fuzzy Frequency Episodes for Intrusion Detection. International Journal of Intelligent Systems, John Wiley & Sons, pp. 687-703.
  17. Moller A.F., 1993. A Scaled Conjugate Gradient Algorithm for Fast Supervised Learning. Neural Networks. Vol. (6), pp. 525-533.
  18. Mukkamala S., Janoski G., Sung A. H., 2002a. Intrusion Detection Using Neural Networks and Support Vector Machines. Proceedings of IEEE International Joint Conference on Neural Networks, pp. 1702-1707.
  19. Mukkamala S., Sung A. H., 2002b. Identifying Key Features for Intrusion Detection Using Neural Networks. Proceedings of ICCC International Conference on Computer Communications 2002.
  20. Ramos V., Abraham A., 2003. Swarms on Continuous Data. Congress on Evolutionary Computation (CEC), IEEE Press, pp. 1370-1375.
  21. Ramos V., Muge F., Pina P., 2002. Self-Organized Data and Image Retrieval as a Consequence of InterDynamic Synergistic Relationships in Artificial Ant Colonies. Soft-Computing Systems - Design, Management and Applications, IOS Press, Frontiers in Artificial Intelligence and Applications, pp. 500-509.
  22. Riedmiller M., Braun H., 1993. A direct adaptive method for faster back propagation learning: The RPROP algorithm. Proceedings of the IEEE International Conference on Neural Networks.
  23. Ryan J., Lin M-J., Miikkulainen R., 1998. Intrusion Detection with Neural Networks. Advances in Neural Information Processing Systems 10, Cambridge, MA: MIT Press.
  24. Steinberg, D, Colla P. L., Martin K., 1999. MARS User Guide. Salford Systems, San Diego, CA.
  25. Stolfo J., Fan W., Lee W., Prodromidis A., Chan P.K., 2000. Cost-based Modeling and Evaluation for Data Mining with Application to Fraud and Intrusion Detection. DARPA Information Survivability Conference.
  26. University of California at Irvine, 1999. KDD Cup: <>.
  27. Vladimir V. N., The Nature of Statistical Learning Theory, Springer-Verlag, Germany, 1995.
  28. Webster S.E., 1998, The Development and Analysis of Intrusion Detection Algorithms. S.M. Thesis, Massachusetts Institute of Technology, June 1998.

Paper Citation

in Harvard Style

Mukkamala S., H. Sung A., Abraham A. and Ramos V. (2004). INTRUSION DETECTION SYSTEMS USING ADAPTIVE REGRESSION SPLINES . In Proceedings of the Sixth International Conference on Enterprise Information Systems - Volume 3: ICEIS, ISBN 972-8865-00-7, pages 26-33. DOI: 10.5220/0002649600260033

in Bibtex Style

author={Srinivas Mukkamala and Andrew H. Sung and Ajith Abraham and Vitorino Ramos},
booktitle={Proceedings of the Sixth International Conference on Enterprise Information Systems - Volume 3: ICEIS,},

in EndNote Style

JO - Proceedings of the Sixth International Conference on Enterprise Information Systems - Volume 3: ICEIS,
SN - 972-8865-00-7
AU - Mukkamala S.
AU - H. Sung A.
AU - Abraham A.
AU - Ramos V.
PY - 2004
SP - 26
EP - 33
DO - 10.5220/0002649600260033