Call for Paper - March 2023 Edition
IJCA solicits original research papers for the March 2023 Edition. Last date of manuscript submission is February 20, 2023. Read More

Intrusion Detection System using Classification Technique

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Rajesh Wankhede, Vikrant Chole

Rajesh Wankhede and Vikrant Chole. Article: Intrusion Detection System using Classification Technique. International Journal of Computer Applications 139(11):25-28, April 2016. Published by Foundation of Computer Science (FCS), NY, USA. BibTeX

	author = {Rajesh Wankhede and Vikrant Chole},
	title = {Article: Intrusion Detection System using Classification Technique},
	journal = {International Journal of Computer Applications},
	year = {2016},
	volume = {139},
	number = {11},
	pages = {25-28},
	month = {April},
	note = {Published by Foundation of Computer Science (FCS), NY, USA}


In today’s world people are extensively using internet and thus are also vulnerable to its flaws. Cyber security is the main area where these flaws are exploited. Intrusion is one way to exploit the internet for search of valuable information that may cause devastating damage, which can be personal or on a large scale. Thus Intrusion detection systems are placed for timely detection of such intrusion and alert the user about the same. Intrusion Detection using hybrid classification technique consist of a hybrid model i.e. misuse detection model (AdTree based) and Anomaly model (svm based).NSL-KDD intrusion detection dataset plays a vital role in calibrating intrusion detection system and is extensively used by the researchers working in the field of intrusion detection. This paper presents Association rule mining technique for IDS.


  1. Gisung Kim and Seungmin Lee (2014), A Novel Hybrid Intrusion Detection Method Integrating Anomaly Detection With Misuse Detection, ELSEVIER, Expert Systems with Applications vol. 41 pp. 1690 – 1700.
  2. Shi-Jinn Horng and Ming-Yang Su (2011), “Novel Intrusion Detection System Based On Hierarchical Clustering and Support Vector Machines”, ELSEVIER, Expert Systems with Applications. pp. 38 306-313.
  3. Mrutyunjaya Panda and Manas Ranjan Patra, “A Comparative Study Of Data Mining Algorithms For Network Intrusion Detection”, First International Conference on Emerging Trends in Engineering and Technology, pp 504-507, IEEE, 2008.
  4. Juan Wang, Qiren Yang, Dasen Ren, “An intrusion detection algorithm based on decision tree technology”, In the Proc. of IEEE Asia-Pacific Conference on Information Processing, 2009.
  5. Hong Kuan Sok, “Using the ADTree for Feature Reduction through Knowledge Discovery” Instrumentation and Measurement Technology Conference (I2MTC), 2013 IEEE International ,pp1040 – 1044.
  6. Tavallaee M, Bagheri E, Lu W, Ghorbani A. “A detailed analysis of the KDD CUP 99 data set”, 2009 IEEE Symposium on Computational intelligence for security and defense applications, 2009,pp 1-6.
  7. F. Amiri, M. Yousefi, C. Lucas, A. Shakery and N. Yazdani, “Mutual Information-Based Feature Selection for Intrusion Detection Systems”, Journal of Network and Computer Applications, Vol. 34, 2011, pp.1184–1199.
  8. Yonav Freund, “The Alternating Decision Tree Algorithm”, ICML '99 Proceedings of the Sixteenth International Conference on Machine Learning, pp 124-133.
  9. Hachmi Fatma, Limam Mohamed “A two-stage technique to improve intrusion detection systems based on data mining algorithms” IEEE, 2013. pp 1-6.
  10. H.F. Eid, A. Darwish A. H. Ella and A. Abraham, “Principle components analysis and Support Vector Machine based Intrusion Detection System,” 2010, 10th International Conference on Intelligent Systems Design and Applications (ISDA), 2010.
  11. Tsang, C. H., Kwong, S., & Wang, H.,” Genetic-fuzzy rule reordering in mining approach and evaluation of feature selection techniques for anomaly intrusion detection”, Pattern Recognition,40 (9), pp. 2373–2391, 2007.
  12. Zhi-Song Pan, Song-Can Chen, Gen-Bao Hu, DaoQiang Zhang, (2010), “Hybrid Neural Network and C4.5 for Misuse Detection ”, Proceedings of the second International conference on Machine Learning and Cybernetics, November, pp. 2463 – 2467.
  13. Siva S.Sivatha Sindhu, S.Geetha and A. Kannan,” Decision tree based light weight intrusion detection using a wrapper approach”, Expert Systems with Applications, 39(1), pp.129-141, 2012.
  14. Therese Bjerkestrand et,al. “An Evaluation of Feature Selection and Reduction Algorithms for Network IDS Data” 2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA 2015).