Intrusion Detection System Using Hybrid Classification Technique
Keywords:
AdTree, SVM, NSL-KDD, IDSAbstract
Cyber Security is one of the key elements of any system. Breaching of cyber security can lead to loss of confidential and private data. To prevent the attacks on network an Intrusion Detection System Using Hybrid Classification Technique is proposed. This IDS uses a decision tree algorithm to classify the known attack types in the dataset and SVM is used to classify the normal data from the dataset, there by detecting the unknown attacks. Dataset used is the NSL-KDD Dataset.
References
Rajesh Wankhede and Vikrant Chole (2016), Intrusion Detection System using Classification technique, International Journal of Computer Applications (0975 – 8887) Volume 139 – No.11, pp. 25-28.
Gisung Kim and Seungmin Lee (2014), A Novel Hybrid Intrusion Detection Method Integrating Anomaly Detection With Misuse Detection, ELSEVIER, Expert Systems with Applications vol. 41 pp. 1690 – 1700.
Zhi-Song Pan, Song-Can Chen, Gen-Bao Hu, DaoQiang Zhang, (2010), ―Hybrid Neural Network and C4.5 for Misuse Detection ‖, Proceedings of the second International conference on Machine Learning and Cybernetics, November, pp. 2463 – 2467.
H.F. Eid, A. Darwish A. H. Ella and A. Abraham, ―Principle components analysis and Support Vector Machine based Intrusion Detection System,‖ 2010, 10th International Conference on Intelligent Systems Design and Applications (ISDA), 2010.
Tsang, C. H., Kwong, S., & Wang, H.,‖ Genetic-fuzzy rule reordering in mining approach and evaluation of feature selection techniques for anomaly intrusion detection‖, Pattern Recognition,40 (9), pp. 2373–2391, 2007. .
Juan Wang, Qiren Yang, Dasen Ren, ―An intrusion detection algorithm based on decision tree technology‖, In the Proc. of IEEE Asia-Pacific Conference on Information Processing, 2009.
M. Revathi, T.Ramesh - Network Intrusion Detection Sysytem using reduced dimentioality Indian Journal of Computer Science and Engineering (IJCSE), Vol. 2 No. 1, pp . 61-67.
Yonav Freund et.al, ―The Alternating Decision Tree Algorithm‖, ICML ‘99 Proceedings of the Sixteenth International Conference on Machine Learning, pp 124-133.
Tavallaee M, Bagheri E, Lu W, Ghorbani A. ―A detailed analysis of the KDD CUP 99 data set‖, IEEE Symposium on Computational intelligence for security and defense applications, 2009,pp 1-6.
Hong Kuan Sok et.al, ―Using the ADTree for Feature Reduction through Knowledge Discovery‖ Instrumentation and Measurement Technology Conference (I2MTC), 2013 IEEE International ,pp1040 – 1044.
Mrutyunjaya Panda and Manas Ranjan Patra, ―A Comparative Study Of Data Mining Algorithms For Network Intrusion Detection‖, First International Conference on Emerging Trends in Engineering and Technology, pp 504-507, IEEE, 2008.
Shi-Jinn Horng and Ming-Yang Su (2011), ―Novel Intrusion Detection System Based On Hierarchical Clustering and Support Vector Machines‖, ELSEVIER, Expert Systems with Applications. pp. 38 306-313.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
