Intrusion-Miner: A Hybrid Classifier for Intrusion Detection using Data Mining
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 4
Abstract
With the rapid growth and usage of internet, number of network attacks have increase dramatically within the past few years. The problem facing in nowadays is to observe these attacks efficiently for security concerns because of the value of data. Consequently, it is important to monitor and handle these attacks and intrusion detection system (IDS) has potentially diagnostic ability to handle these attacks to secure the network. Numerous intrusion detection approaches are presented but the main hindrance is their performance which can be improved by increasing detection rate as well as decreasing false positive rates. Optimizing the performance of IDS is very serious issue and challenging fact that gets more attention from the research community. In this paper, we proposed a hybrid classification approach ‘Intrusion-Miner’ with the help of two classifier algorithm for network anomaly detection to get optimum result and make it possible to detect network attacks. Thus, principal component analysis (PCA) and Fisher Discriminant Ratio (FDR) have been implemented for the feature selection and noise removal. This hybrid approach is compared with J48, Bayesnet, JRip, SMO, IBK and evaluate the performance using KDD99 dataset. Experimental result revealed that the precision of the proposed approach is measured as 96.1 % with low false positive and high false negative rate as compare to other state-of-the-art algorithm. The simulation result evaluation shows that perceptible progress and real-time intrusion detection can be attained as we apply the suggested models to identify diverse kinds of network attacks.
Authors and Affiliations
Samra Zafar, Muhammad Kamran, Xiaopeng Hu
Algorithms for Content Distribution in Networks
In this paper an algorithm is presented which helps us to optimize the performance of content distribution servers in a network. If it is following the pay-as-you-use model then this algorithm will result in significant...
Internet of Plants Application for Smart Agriculture
Nowadays, Internet of Things (IoT) is receiving a great attention due to its potential strength and ability to be integrated into any complex system. The IoT provides the acquired data from the environment to the Interne...
Graduation Certificate Verification Model: A Preliminary Study
Graduation certificates issued by universities and other educational institutions are one of the most important documents for a graduate. It is a proof of graduate’s qualifications and can be used to advance forward in o...
Feasibility Study of Optical Spectroscopy as a Medical Tool for Diagnosis of Skin Lesions
Skin cancer is one of the most frequently en-countered types of cancer in the Western world. According to the Skin Cancer Foundation Statistics, one in every five Americans develops skin cancer during his/her lifetime. T...
Formal Concept Analysis based Framework for Evaluating Information System Success
This paper aims to propose a methodology for evaluating information system success. It is based on two main fields, which are formal concept analysis and multi criteria decision-making methods. A framework whose main obj...