Research Article

A Comparative Study of Intrusion Detection Algorithms

by  Ruchi Jain, Anand Singh Rajawat
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 173 - Issue 4
Published: Sep 2017
Authors: Ruchi Jain, Anand Singh Rajawat
10.5120/ijca2017915288
PDF

Ruchi Jain, Anand Singh Rajawat . A Comparative Study of Intrusion Detection Algorithms. International Journal of Computer Applications. 173, 4 (Sep 2017), 25-29. DOI=10.5120/ijca2017915288

                        @article{ 10.5120/ijca2017915288,
                        author  = { Ruchi Jain,Anand Singh Rajawat },
                        title   = { A Comparative Study of Intrusion Detection Algorithms },
                        journal = { International Journal of Computer Applications },
                        year    = { 2017 },
                        volume  = { 173 },
                        number  = { 4 },
                        pages   = { 25-29 },
                        doi     = { 10.5120/ijca2017915288 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2017
                        %A Ruchi Jain
                        %A Anand Singh Rajawat
                        %T A Comparative Study of Intrusion Detection Algorithms%T 
                        %J International Journal of Computer Applications
                        %V 173
                        %N 4
                        %P 25-29
                        %R 10.5120/ijca2017915288
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Intrusion detection system (IDS) is a kind of security management model that can be installed in computers and networks. IDS gather information from the network and computer and analyses it to find the possible security breaches into the system, which contain both intrusions and misuse. If we see modern IDS they also have few vulnerabilities, these systems also have drawbacks of false detection. So we aim to make a new model which can decrease the possibilities of false detection. In this paper we have done a survey of different algorithm used in intrusion detection system and then designed a new model that will use correlation based feature selection algorithm and SVM. This model will be tested on KDDCup99 dataset.

References
  • Dr. S.Vijayarani1 and Ms. Maria Sylviaa.S, “Intrusion Detection System – A Study” International Journal of Security, Privacy and Trust Management, Volume 4, No 1, February 2015
  • Uman K Chaudhary, Ioannis Papapanagiotou, Flow classification using clustering and association rule mining.
  • Jeffrey Erman, Martin Arlitt, Anirban Mahanti, “Traffic Classification Using Clustering Algorithms”, University of Calgary, 2500 University Drive NW, Calgary, AB, Canada
  • MR Shanmugavadivu, “KDD Cup 99 Dataset” ‎2015
  • Terry Brugger 15 Sep 2007 KDD Cup '99 dataset (Network Intrusion) considered harmful http://www.kdnuggets.com/news/2007/n18/4i.html
  • Te-Shun Chou, Kang K. Yen, and Jun Luo Te-Shun Chou, Kang K. Yen, and Jun Luo “Correlation-Based Feature Selection For Intrusion Detection Design”, 2007
  • Sonali Rathore et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (4) , 2015, 3345-3348, “Intrusion Detection System on KDDCup99 Dataset: A Survey”
  • Ms. Urvashi Modi, Prof. Anurag Jain. A survey of IDS classification using KDD CUP 99 dataset in WEKA, International Journal of Scientific & Engineering Research, Volume 6, Issue 11, November-2015.
  • Megha Aggarwal, Amrita, “Performance Analysis Of Different Feature Selection Methods In Intrusion Detection”, International Journal of scientific & technology research volume 2, issue 6, june 2013 ISSN 2277-8616 225 IJSTR©2013 www.ijstr.org
  • Manjiri V. Kotpalliwar, Rakhi Wajgi, "Classification of Attacks Using Support Vector Machine (SVM) on KDDCUP’99 IDS Database", 2015, Fifth International Conference on Communication Systems and Network Technologies
  • Building Efficient Intrusion Detection Model Based on Principal Component Analysis and C4.5 You Chen' ,Yang Li' , Xue-Qi Cheng1,Li Guo
  • Basant Subba , Santosh Biswas, Sushanta Karmakar, "A Neural Network Based System for Intrusion Detection and Attack Classification", 2016
  • Mr. Vijay D. Katkar, Mr. Siddhant Vijay Kulkarni, "Experiments on Detection of Denial of Service Attacks using Naive Bayesian Classifier" 2013
  • Vidit Pathak,Dr. Ananthanarayana V. S., " A Novel Multi-Threaded K-Means Clustering Approach for Intrusion Detection" 2012
  • Hossein Gharaee, Hamid Hosseinvand, “A New Feature Selection IDS based on Genetic Algorithm and SVM” 2016 8th International Symposium on Telecommunications (lST'2016)
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

NIDS HIDS KDDCUP9 DATASET CFS SVM U2R R2L PROBE DoS

Powered by PhDFocusTM