CLASSIFICATION TECHNIQUES APPLIED FOR INTRUSION DETECTION

Abstract

Intrusion detection system (IDS) was designed to monitor the network activity and it identifies the normal and abnormal behavioral pattern in the network. If there was any abnormal pattern, it indicates the system is in attack by compromising the confidentiality, availability or integrity of the computer system. IDS perform three functions namely monitoring, detecting and responding for malicious activity. Experiment is based on kdd99 dataset to categorize normal and abnormal pattern. Goal of this paper is to compare three classification techniques by considering two classifiers from each technique and find out the best one based on the true positive, false positive and average accuracy.

Authors and Affiliations

Saranya. V , Amsaveni. R

Keywords

Related Articles

Advantages of Blackman Window over Hamming Window Method for designing FIR Filter

In signal processing, there are mainly two types of filters exist and the are Finite Impulse Response(FIR) filter and Infinite Impulse Response(IIR) filter. Finite Impulse Response(FIR) filter can be designed form Infini...

A Comparative Study of Various Fault Localization Methodologies

Fault in terms of Software Engineering is referred to as a bug, an error or a problem which causes a program to crash or generate invalid results. The problem is caused by either incorrect logic or insufficient logic. Fa...

A HYBRID APPROACH FOR CLUSTERING BASED ON COMBINATIONAL ALGORITHMS

Data clustering helps one discern the structure of and simplify the complexity of massive quantities of data. It is a common technique for statistical data analysis and is used in many fields, including machine learning,...

Privacy Preserving Based on PCA Transformation Using Data Perturbation Technique

Maintain confidentiality, privacy and security research in data mining (PPDM) is one of the biggest trends. Recent advances in data collection, data dissemination and related technologies have inaugurated a new era of re...

Foundations of a rapid de-noising technique in real time image processing applications

A noise is an inherent entity of the imaging technologies that tend to deteriorate the quality of processed images at all levels. At the hardware level they appear as the dark current, shot noise etc. however at the imag...

Download PDF file
  • EP ID EP86878
  • DOI -
  • Views 151
  • Downloads 0

How To Cite

Saranya. V, Amsaveni. R (2012). CLASSIFICATION TECHNIQUES APPLIED FOR INTRUSION DETECTION. International Journal of Computer Science & Engineering Technology, 3(4), 106-113. https://europub.co.uk/articles/-A-86878