Comparison of Performance for Intrusion Detection System Using Different Rules of Classification

被引:0
|
作者
Sengupta, Nandita [1 ]
Sil, Jaya [2 ]
机构
[1] Univ Coll Bahrain, Manama, Bahrain
[2] Univ Shibpur, Bengal Engn & Sci, Howrah, WB, India
关键词
Classification; Intrusion Detection System; Rough Set Theory; Rules;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Classification is very important for designing intrusion detection system that classifies network traffic data. Broadly traffic data is classified as normal or anomaly. In the work classification performance using rules obtained by different methods are applied on network traffic and compared. Classifier is built based on rules of decision table, conjunctive rule, OneR, PART, JRip, NNge, ZeroR, BayesNet, Ridor from WEKA and using rough set theory. Classification performance is compared applying on KDD data set where the whole data set is divided into training and test data set. Rules are formed using training data set by different rule generation methods and later applied on test data set to calculate accuracy of classifiers.
引用
收藏
页码:87 / +
页数:2
相关论文
共 50 条
  • [21] Performance Evaluation of Rough Set Based Classification Models to Intrusion Detection System
    Suyal, Priyanka
    Pant, Janmejay
    Dwivedi, Akhilesh
    Lohani, Manoj Chandra
    2016 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION, & AUTOMATION (ICACCA) (FALL), 2016, : 209 - 214
  • [22] Increasing Performance Of Intrusion Detection System Using Neural Network
    Kumar, Satendra
    Yadav, Anamika
    2014 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2014, : 546 - 550
  • [23] An Efficient Network Intrusion Detection and Classification System
    Ahmad, Iftikhar
    Ul Haq, Qazi Emad
    Imran, Muhammad
    Alassafi, Madini O.
    AlGhamdi, Rayed A.
    MATHEMATICS, 2022, 10 (03)
  • [24] The application of classification methods in intrusion detection system
    Chen Fen
    Wu Shunxiang
    ICCSE'2006: Proceedings of the First International Conference on Computer Science & Education: ADVANCED COMPUTER TECHNOLOGY, NEW EDUCATION, 2006, : 586 - 588
  • [25] Performance Comparison of Intrusion Detection System based Anomaly Detection using Artificial Neural Network and Support Vector Machine
    Cahyo, Aditya Nur
    Hidayat, Risanuri
    Adhipta, Dani
    ADVANCES OF SCIENCE AND TECHNOLOGY FOR SOCIETY, 2016, 1755
  • [26] Evaluation and Comparison of Classification Techniques for Network Intrusion Detection
    Giray, Sait Murat
    Polat, Aydin Goze
    2013 IEEE 13TH INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW), 2013, : 335 - 342
  • [27] Performance Evaluation of an Intrusion Detection System
    Saber, Mohammed
    Chadli, Sara
    Emharraf, Mohamed
    El Farissi, Ilhame
    PROCEEDINGS OF THE MEDITERRANEAN CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES 2015 (MEDCT 2015), VOL 2, 2016, 381 : 509 - 517
  • [28] Intrusion detection using rough set classification
    Zhang L.-H.
    Zhang G.-H.
    Yu L.
    Zhang J.
    Bai Y.-C.
    Journal of Zhejiang University-SCIENCE A, 2004, 5 (9): : 1076 - 1086
  • [29] Intrusion detection using rough set classification
    张连华
    张冠华
    郁郎
    张洁
    白英彩
    Journal of Zhejiang University Science, 2004, (09) : 70 - 80
  • [30] Intrusion Detection using an Ensemble of Classification Methods
    Govindarajan, M.
    Chandrasekaran, R. M.
    WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, WCECS 2012, VOL I, 2012, : 459 - 464