Comparison of Performance for Intrusion Detection System Using Different Rules of Classification

被引:0
|
作者
Sengupta, Nandita [1 ]
Sil, Jaya [2 ]
机构
[1] Univ Coll Bahrain, Manama, Bahrain
[2] Univ Shibpur, Bengal Engn & Sci, Howrah, WB, India
关键词
Classification; Intrusion Detection System; Rough Set Theory; Rules;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Classification is very important for designing intrusion detection system that classifies network traffic data. Broadly traffic data is classified as normal or anomaly. In the work classification performance using rules obtained by different methods are applied on network traffic and compared. Classifier is built based on rules of decision table, conjunctive rule, OneR, PART, JRip, NNge, ZeroR, BayesNet, Ridor from WEKA and using rough set theory. Classification performance is compared applying on KDD data set where the whole data set is divided into training and test data set. Rules are formed using training data set by different rule generation methods and later applied on test data set to calculate accuracy of classifiers.
引用
收藏
页码:87 / +
页数:2
相关论文
共 50 条
  • [1] Performance Comparison of Intrusion Detection System using Three Different Machine Learning Algorithms
    Ibrahim, Zena Khalid
    Thanon, Mohammed Younis
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2021), 2021, : 1116 - 1124
  • [2] Comparison of the Intrusion Detection System Rules in Relation with the SCADA Systems
    Vavra, Jan
    Hromada, Martin
    SOFTWARE ENGINEERING PERSPECTIVES AND APPLICATION IN INTELLIGENT SYSTEMS, VOL 2, 2016, 465 : 159 - 169
  • [3] Intrusion detection system using rough classification algorithm
    Coutinho, M.P.
    Coutinho, I.P.
    Lambert-Torres, G.
    Borges Da Silva, L.E.
    Advances in Systems Engineering, Signal Processing and Communications, 2002, : 329 - 334
  • [4] Performance of Intrusion Detection System using GRNN
    Choudhary, Amit Kumar
    Swarup, Akhilesh
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (12): : 219 - 222
  • [5] Comparative performance analysis of classification algorithms for intrusion detection system
    Anbar, Mohammed
    Abdullah, Rosni
    Hasbullah, Iznan H.
    Chong, Yung-Wey
    Elejla, Omar E.
    2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
  • [6] Comparison of Classification Techniques for Intrusion Detection Dataset Using WEKA
    Garg, Tanya
    Khurana, Surinder Singh
    2014 RECENT ADVANCES AND INNOVATIONS IN ENGINEERING (ICRAIE), 2014,
  • [7] Efficient Intrusion Detection with Reduced Dimension Using Data Mining Classification Methods and Their Performance Comparison
    Kavitha, B.
    Karthikeyan, S.
    Chitra, B.
    INFORMATION PROCESSING AND MANAGEMENT, 2010, 70 : 96 - +
  • [8] Performance Evaluation of Different Intrusion Detection System: An Empirical Approach
    Beigh, Bilal Maqbool
    Peer, M. A.
    2014 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2014,
  • [9] Attack classification of an intrusion detection system using deep learning and
    Novaria Kunang, Yesi
    Nurmaini, Siti
    Stiawan, Deris
    Suprapto, Bhakti Yudho
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58
  • [10] Intrusion Detection System Based on ViTCycleGAN and Rules
    Fang, Menghao
    Li, Xia
    Wang, Yuanyuan
    Wang, Qiuxuan
    Sun, Xinlei
    Zhang, Shuo
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT III, ICIC 2024, 2024, 14864 : 203 - 214