Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Hybrid Approach of Intrusion Detection based on Sequential Feature Selection, EM Clustering and Decision Stump Classification

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Authors:
Gulshan Ansari, Tanveer Farooqui
10.5120/ijca2016911280

Gulshan Ansari and Tanveer Farooqui. Hybrid Approach of Intrusion Detection based on Sequential Feature Selection, EM Clustering and Decision Stump Classification. International Journal of Computer Applications 148(9):13-18, August 2016. BibTeX

@article{10.5120/ijca2016911280,
	author = {Gulshan Ansari and Tanveer Farooqui},
	title = {Hybrid Approach of Intrusion Detection based on Sequential Feature Selection, EM Clustering and Decision Stump Classification},
	journal = {International Journal of Computer Applications},
	issue_date = {August 2016},
	volume = {148},
	number = {9},
	month = {Aug},
	year = {2016},
	issn = {0975-8887},
	pages = {13-18},
	numpages = {6},
	url = {http://www.ijcaonline.org/archives/volume148/number9/25784-2016911280},
	doi = {10.5120/ijca2016911280},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

Other than the emerging IT sector, security is still being a major issue for various companies. Various companies are suffering from several types of threats these days like viruses or intrusions, etc. There are various types of techniques have been applied by the companies like for detection of intrusion and also for providing prevention to the system in order to secure the companies against these types of intrusions. The technology of Intrusion-detection can have a lot of problems, such as low performance, low intelligent level, and more false-negative-rate, high-false-alarm-rate, and so on. The purpose of the IDS is to detect attacks. Objective of this analysis is to describe the phases of the development of concepts of the IDS along with its significance for the researchers and the research-centers, military domains, security and also in order to determine the significance of IDS categories, its classifications, and in which area applied the IDS in order to decrease the threats of network.

References

  1. Lata, InduKashyap, '' Study and Analysis of Network based Intrusion Detection System'', International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 5, May 2013
  2. N.S.CHANDOLIKAR, V.D.NANDAVADEKAR, ''Comparative Analysis of two Algorithms for intrusion attack classification using KDDCUP DataSet'', International Journal of Computer Science and Engineering ( IJCSE ) Vol.1, Issue 1 Aug 2012.
  3. Devikrishna K, Ramakrishna B, ''An Artificial Neural Network based Intrusion Detection System and Classification of Attacks '', International Journal of Scientific & Engineering Research, Volume 6, Issue 1, January-2015 1370
  4. Vaishali Kosamkar, Sangita S Chaudhari,'' Improved Intrusion Detection System using C4.5 Decision Tree and Support Vector Machine'',International Journal of Computer Science and Information Technologies, Vol. 5 (2) , 2014.
  5. Sisily Sibichen and Sreela Sreedhar,2013. The study of An Efficient AODV Protocol and Encryption Machanism for Security Issues in Adhoc Networks. In Proceeding of IEEE (International Conference on Microelectronics,Communication and Renewable Energy.
  6. P.Kavitha and RajeswariMukesh, 2015. The study of To Detect Malicious Nodes in the Mobile Ad-Hoc Networks using Soft Computing Technique. In Proceeding of IEEE (IEEE SPONSORED SECOND INTERNATIONAL CONFRENCE ON ELECTRONICS AND COMMUNICATION SYSTEM .
  7. Rajendra V. Boppana, Senior Member, IEEE, and Xu Su, Member, IEEE A Distributed ID for Ad Hoc Networks, 26th International Conference on Advanced Information Networking and Applications 2012.
  8. Leila Mechtri, Fatiha Djemili Tolba, Salim Ghanemi, MASID,”Multi agent based intrusion detection in MANET”, IEEE 2012.
  9. Monita waghengbam and ningrila marchang,”Intrusion detection in MANET using fuzzy logic”, IEEE 2012.
  10. X. Zhang, L. Jia, H. Shi, Z. Tang and X. Wang, "The Application of Machine Learning Methods to Intrusion Detection", Engineering and Technology (S-CET), 2012 Spring Congress on, (2012), pp. 1-4.
  11. Robert Mitchell and Ing-Ray Chen, “Behavior Rule Specification-based Intrusion Detection for Safety Critical Medical Cyber Physical Systems”, IEEE Transactions on Dependable and Secure Computing (Volume:12 , Issue: 1 ), 2014
  12. Devikrishna K S and Ramakrishna B B, “An Artificial Neural Network based Intrusion Detection System and Classification of Attacks”, International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622, Vol. 3, Issue 4, Jul-Aug 2013, pp. 1959-1964
  13. Vaishali Kosamkar, Sangita S Chaudhari, “Improved Intrusion Detection System using C4.5 Decision Tree and Support Vector Machine”, (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (2) , 2014, 1463-1467
  14. Emma Ireland et al. 2013. Intrusion Detection with Genetic Algorithms and Fuzzy Logic. UMM CSci Senior Seminar Conference, Morris, MN.
  15. Ahmed A. Elngar et al. 2013. A Real-Time Anomaly Network Intrusion Detection System with High Accuracy. Information Science Letters.
  16. A.M. Chandrasekhar, “Intrusion Detection Technique By Using K-Means, Fuzzy Neural And Svm Classifier “, 2013 International Conference on Computer Communication and Informatics (ICCCI - 2013), Jan 04-06, 2013 Coimbatore, India.
  17. Elhadi M. Shakshuki, Nan Kang, and Tarek R. Sheltami, “EAACK- A Secure Intrusion Detection System for MANETs” IEEE trans. Vol.60, no.3, MAR, 2013.

Keywords

Feature Selection, EM Clustering, Decision Stump Classification, Intrusion Detection