NETWORK INTRUSION DETECTION SYSTEM USING REDUCED DIMENSIONALITY
Journal Title: Indian Journal of Computer Science and Engineering - Year 2011, Vol 2, Issue 1
Abstract
Intrusion Detection System (IDS) is the science of detection of malicious activity on a computer network and the basic driver for network security. It is defined as a process of monitoring the events occurring in a computer system or network and analyzing them to differentiate between normal activities of the system and behaviors that can be classified as suspicious or intrusive. In this paper identifying the network attacks and comparing the performance of the algorithms is performed respectively. The Dimension Reduction focuses on using information obtained KDD Cup 99 data set for the selection of attributes to identify the type of attacks. The dimensionality reduction is performed on 41 attributes to 14 and 7 attributes based on Best First Search method and then apply the two classifying Algorithms ID3 and J48.
Authors and Affiliations
M. Revathi , T. Ramesh
A TESTING FRAMEWORK FOR FAULT TOLERANT COMPOSITION OF TRANSACTIONAL WEB SERVICES
Software testers have great challenges in testing of web services therefore testing technique must be developed for testing of web services. Web service composition is an active research area over last few years. This pa...
FRAMEWORK FOR CLUSTERING ON SOCIAL NETWORKING MESSAGE
Normally, the messages collected from the social networking applications are highly unstructured and cluttered that pose a significant level of difficulty for applying conventional mining technique. Is such data are not...
ARTIFICIAL NEURAL NETWORK BASED CLASSIFICATION OF AUSTENITIC STAINLESS STEEL WELD DEFECTS IN TOFD TECHNIQUE
In this paper, an automatic detection system to recognize welding defects based on Time of flight diffraction technique is described. The proposed classification consists in detecting the four types of austenitic stainle...
COMPARISON AND EVALUATION ON METRICS BASED APPROACH FOR DETECTING CODE CLONE
Many techniques were proposed for detecting code clone. In this paper we have compared the metrics based on speed, quality and their cost as these are the most that affects due to code clone. The strength and weakness of...
SURVEY SOME ATTACKS ON CLIENT SIDE, BROWSER & CLOUD
Cloud computing is not a new name in the technology world but there are many new issues arises related with cloud. Every time in consumer mind a fear rotates because he is aware from vulnerabilities related with cloud. S...