CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Intrusion Detection System using Classification Technique

by Rajesh Wankhede, Vikrant Chole
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 139 - Number 11
Year of Publication: 2016
Authors: Rajesh Wankhede, Vikrant Chole
10.5120/ijca2016909397

Rajesh Wankhede, Vikrant Chole . Intrusion Detection System using Classification Technique. International Journal of Computer Applications. 139, 11 ( April 2016), 25-28. DOI=10.5120/ijca2016909397

@article{ 10.5120/ijca2016909397,
author = { Rajesh Wankhede, Vikrant Chole },
title = { Intrusion Detection System using Classification Technique },
journal = { International Journal of Computer Applications },
issue_date = { April 2016 },
volume = { 139 },
number = { 11 },
month = { April },
year = { 2016 },
issn = { 0975-8887 },
pages = { 25-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume139/number11/24535-2016909397/ },
doi = { 10.5120/ijca2016909397 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:40:40.593335+05:30
%A Rajesh Wankhede
%A Vikrant Chole
%T Intrusion Detection System using Classification Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 139
%N 11
%P 25-28
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In today’s world people are extensively using internet and thus are also vulnerable to its flaws. Cyber security is the main area where these flaws are exploited. Intrusion is one way to exploit the internet for search of valuable information that may cause devastating damage, which can be personal or on a large scale. Thus Intrusion detection systems are placed for timely detection of such intrusion and alert the user about the same. Intrusion Detection using hybrid classification technique consist of a hybrid model i.e. misuse detection model (AdTree based) and Anomaly model (svm based).NSL-KDD intrusion detection dataset plays a vital role in calibrating intrusion detection system and is extensively used by the researchers working in the field of intrusion detection. This paper presents Association rule mining technique for IDS.

References
  1. Gisung Kim and Seungmin Lee (2014), A Novel Hybrid Intrusion Detection Method Integrating Anomaly Detection With Misuse Detection, ELSEVIER, Expert Systems with Applications vol. 41 pp. 1690 – 1700.
  2. Shi-Jinn Horng and Ming-Yang Su (2011), “Novel Intrusion Detection System Based On Hierarchical Clustering and Support Vector Machines”, ELSEVIER, Expert Systems with Applications. pp. 38 306-313.
  3. Mrutyunjaya Panda and Manas Ranjan Patra, “A Comparative Study Of Data Mining Algorithms For Network Intrusion Detection”, First International Conference on Emerging Trends in Engineering and Technology, pp 504-507, IEEE, 2008.
  4. Juan Wang, Qiren Yang, Dasen Ren, “An intrusion detection algorithm based on decision tree technology”, In the Proc. of IEEE Asia-Pacific Conference on Information Processing, 2009.
  5. Hong Kuan Sok et.al, “Using the ADTree for Feature Reduction through Knowledge Discovery” Instrumentation and Measurement Technology Conference (I2MTC), 2013 IEEE International ,pp1040 – 1044.
  6. Tavallaee M, Bagheri E, Lu W, Ghorbani A. “A detailed analysis of the KDD CUP 99 data set”, 2009 IEEE Symposium on Computational intelligence for security and defense applications, 2009,pp 1-6.
  7. F. Amiri, M. Yousefi, C. Lucas, A. Shakery and N. Yazdani, “Mutual Information-Based Feature Selection for Intrusion Detection Systems”, Journal of Network and Computer Applications, Vol. 34, 2011, pp.1184–1199.
  8. Yonav Freund et.al, “The Alternating Decision Tree Algorithm”, ICML '99 Proceedings of the Sixteenth International Conference on Machine Learning, pp 124-133.
  9. Hachmi Fatma, Limam Mohamed “A two-stage technique to improve intrusion detection systems based on data mining algorithms” IEEE, 2013. pp 1-6.
  10. H.F. Eid, A. Darwish A. H. Ella and A. Abraham, “Principle components analysis and Support Vector Machine based Intrusion Detection System,” 2010, 10th International Conference on Intelligent Systems Design and Applications (ISDA), 2010.
  11. Tsang, C. H., Kwong, S., & Wang, H.,” Genetic-fuzzy rule reordering in mining approach and evaluation of feature selection techniques for anomaly intrusion detection”, Pattern Recognition,40 (9), pp. 2373–2391, 2007.
  12. Zhi-Song Pan, Song-Can Chen, Gen-Bao Hu, DaoQiang Zhang, (2010), “Hybrid Neural Network and C4.5 for Misuse Detection ”, Proceedings of the second International conference on Machine Learning and Cybernetics, November, pp. 2463 – 2467.
  13. Siva S.Sivatha Sindhu, S.Geetha and A. Kannan,” Decision tree based light weight intrusion detection using a wrapper approach”, Expert Systems with Applications, 39(1), pp.129-141, 2012.
  14. Therese Bjerkestrand et,al. “An Evaluation of Feature Selection and Reduction Algorithms for Network IDS Data” 2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA 2015).
Index Terms

Computer Science
Information Sciences

Keywords

SVM AdTree NSL-KDD