Fuzzy K-mean Clustering Via J48 For Intrusiion Detection System
Journal Title: International Journal of Computer Science and Information Technologies - Year 2010, Vol 1, Issue 4
Abstract
Due to fast growth of the internet technology there is need to establish security mechanism. So for achieving this objective NIDS is used. Datamining is one of the most effective techniques used for intrusion detection. This work evaluates the performance of unsupervised learning techniques over benchmark intrusion detection datasets. The model generation is computation intensive, hence to reduce the time required for model generation various feature selection algorithm. Various algorithms for cluster to class mapping have been proposed to overcome problem like, class dominance, and null class problems. From experimental results it is observed that for 2 class datasets filtered fuzzy random forest dataset gives the better results. It is having 99.2% precision and 100% recall, So it can be summarize that proposed percentage is assignments and statistical model is giving better performance.
Authors and Affiliations
Kusum Bharti , Shweta Jain , Sanyam Shukla
Study of Security in Wireless Sensor Networks
Wireless Sensor Network (WSN) is an emerging technology that shows great assure for various futuristic applications both for public and military. Many researchers tried to develop further cost and energy e...
A new horizon in data security by Cryptography & Steganography
Steganography and Cryptography are two popular ways of sending vital information in a secret way. One hides the existence of the message and the other distorts the message itself. There are many cryptographic t...
Design and Analysis of Enhanced HTTP Proxy Cashing Server
A proxy acts as an intermediary agent between its clients and the servers which they want to access, performing functions directed towards a variety of purposes, like security, caching, etc, in its capacity as an interm...
Pattern Extraction, Classification and Comparison Between Attribute Selection Measures
In this research, we have compared three different attribute selection measures algorithms. We have used ID3 algorithm, C4.5 algorithm and CART algorithm. All these algorithms are decision tree based algor...
Security Enhancement of First Mile Wireless Access with Optimal QoS through Anonymity in Convergence Network
The first mile wireless access of convergence networks is prone to various attacks due to the broadcasting feature of transmission. Most of the existing security measures focus on protection of message contents, leaving...