Surat Srinoy2025-03-102025-03-102007Proceedings of the 2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications, CISDA 20071424407001; 978-142440700-210.1109/CISDA.2007.3681522-s2.0-34548793095https://repository.dusit.ac.th//handle/123456789/5053Advance in information and communication technologies, force us to keep most of the information electronically, consequently, the security of information has become a fundamental issue. The traditional intrusion detection systems look for unusual or suspicious activity, such as patterns of network traffic that are likely indicators of unauthorized activity. However, normal operation often produces traffic that matches likely "attack signature", resulting in false alarms. One main drawback is the inability of detecting new attacks which do not have known signatures. In this paper particle swarm optimization (PSO) is used to implement a feature selection, and support vector machine (SVMs) with the one-versus-rest method serve as a fitness function of PSO for classification problems from the literature. Experimental result shows that our method allows us to recognize not only known attacks but also to detect suspicious activity that may be the result of a new, unknown attack. Our method simplifies features effectively and obtains a higher classification accuracy compared to other methods. © 2007 IEEE.Intrusion detection model based on particle swarm optimization and support vector machineConference paperScopus