CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

An Efficient Algorithm for Network Intrusion Detection System

by V. Jaiganesh, S. Mangayarkarasi, P. Sumathi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 90 - Number 12
Year of Publication: 2014
Authors: V. Jaiganesh, S. Mangayarkarasi, P. Sumathi
10.5120/15771-4100

V. Jaiganesh, S. Mangayarkarasi, P. Sumathi . An Efficient Algorithm for Network Intrusion Detection System. International Journal of Computer Applications. 90, 12 ( March 2014), 12-16. DOI=10.5120/15771-4100

@article{ 10.5120/15771-4100,
author = { V. Jaiganesh, S. Mangayarkarasi, P. Sumathi },
title = { An Efficient Algorithm for Network Intrusion Detection System },
journal = { International Journal of Computer Applications },
issue_date = { March 2014 },
volume = { 90 },
number = { 12 },
month = { March },
year = { 2014 },
issn = { 0975-8887 },
pages = { 12-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume90/number12/15771-4100/ },
doi = { 10.5120/15771-4100 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:10:50.971683+05:30
%A V. Jaiganesh
%A S. Mangayarkarasi
%A P. Sumathi
%T An Efficient Algorithm for Network Intrusion Detection System
%J International Journal of Computer Applications
%@ 0975-8887
%V 90
%N 12
%P 12-16
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Nowadays it is a vital role to provide a high level security to protect highly sensitive and private data. A lot of work is required to be done in the field of application of AI techniques to the field of network security. Firewall alone is just not enough to protect a corporate network from all type of internal and external threats. It is beyond the limits of conventional technologies to cope up with new and new attack patterns and exploitations of system vulnerabilities. Intrusion Detection System is a software or hardware device which is the essential technology in Network Security. Intelligent IDSs have to be developed. Today researchers have interested on intrusion detection system using Data mining techniques as an artful skill. In this paper, implement a model based on ID3 algorithm and proposed Exclusive ID3 algorithm which detects unknown attacks with the help of optimized decision tree from available set of data also follow predefined rules for accurate decision making for system Administrator.

References
  1. Anant R. More, Vikas N. Nandgaonkar, Dr. ManojNagmode, Pramod P. Patil "ID3 Algorithm for Intrusion Detection" International Conference on Recent Trends in engineering & Technology - 2013(ICRTET'2013).
  2. Ahmed Youssef and Ahmed Emam "Network Intrusion Detection using Data Mining and Network. Behavior Analysis" International Journal of Computer Science & Information Technology (IJCSIT) Vol 3, No 6, Dec 2011.
  3. AnazidaZainal, MohdAizainiMaarof and SitiMariyamShamsuddin "Data Reduction and Ensemble Classifiers in Intrusion Detection" in 2008 IEEE.
  4. Chau M. , Xu J. J. and Chen H. (2002) National Conference on Digital Government Research, 271-275.
  5. Devaraju . S, Ramakrishnan . S "Detection of Accuracy for Intrusion Detection System using Neural Network Classifier" International Journal of Emerging Technology and Advanced Engineering( ISSN 2250-2459 (Online), An ISO 9001:2008 Certified Journal, Volume 3, Special Issue 1, January 2013).
  6. Devendrakailashiya, Dr. R. C. Jain "Improve Intrusion Detection Using Decision Tree with Sampling" in IJCTA | MAY-JUNE 2012.
  7. GuangqunZhai, Chunyan Liu "Research and Improvement on ID3 Algorithm in Intrusion Detection System" in 2010 IEEE.
  8. Jorge Blasco, Agustin Orfila, Arturo Ribagorda "Improving Network Intrusion Detection by Means of Domain-Aware Genetic Programming" DOI 10. 1109/ARES. 2010. 53 in IEEE 2010.
  9. Joshi . S. A, VarshaS. Pimprale "Network Intrusion Detection System (NIDS) based on Data Mining"International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 1, January 2013.
  10. Mohd. JunedulHaque, Khalid. W. Magld, NisarHundewale "An Intelligent Approach for Intrusion Detection Based on Data Mining Techniques" in 2012 IEEE.
  11. YacineBouzida, Frederic Cuppens "Neural networks vs. decision trees for intrusion detection" in 2011. SIGMOD Rec-ord, 30 (4), 25-34.
  12. YacineBouzida, Frederic Cuppens "Neural networks vs. decision trees for intrusion detection" in 2011. SIGMOD Rec-ord, 30 (4), 25-34.
Index Terms

Computer Science
Information Sciences

Keywords

IDS Decision Tree Network Intrusion Detection ID3 algorithm Time-To-Live Value Intrusion Attacks