Comparison of Performance for Intrusion Detection System Using Different Rules of Classification

被引:0
|
作者
Sengupta, Nandita [1 ]
Sil, Jaya [2 ]
机构
[1] Univ Coll Bahrain, Manama, Bahrain
[2] Univ Shibpur, Bengal Engn & Sci, Howrah, WB, India
关键词
Classification; Intrusion Detection System; Rough Set Theory; Rules;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Classification is very important for designing intrusion detection system that classifies network traffic data. Broadly traffic data is classified as normal or anomaly. In the work classification performance using rules obtained by different methods are applied on network traffic and compared. Classifier is built based on rules of decision table, conjunctive rule, OneR, PART, JRip, NNge, ZeroR, BayesNet, Ridor from WEKA and using rough set theory. Classification performance is compared applying on KDD data set where the whole data set is divided into training and test data set. Rules are formed using training data set by different rule generation methods and later applied on test data set to calculate accuracy of classifiers.
引用
收藏
页码:87 / +
页数:2
相关论文
共 50 条
  • [31] Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
    Bahjat, Hala
    Mohammed, Suhaila N.
    Ahmed, Wafaa
    Hamad, Sumaya
    Mohammed, Shayma
    2020 13TH INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING (DESE 2020), 2020, : 257 - 262
  • [32] Improving Classification Accuracy of Intrusion Detection System using Feature Subset Selection
    Bahl, Shilpa
    Sharma, Sudhir Kumar
    2015 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION TECHNOLOGIES ACCT 2015, 2015, : 431 - 436
  • [33] An effective ensemble classification framework for intrusion detection system using LSTM autoencoder
    Ketepalli G.
    Bulla P.
    Journal of Intelligent and Fuzzy Systems, 2024, 46 (04): : 7613 - 7626
  • [34] Intrusion Detection and Prevention System Using K-Learning Classification in Cloud
    Kumawat, Sunita
    Sharma, Anil Kumar
    Kumawat, Anjali
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 815 - 820
  • [35] Efficient Intrusion Detection System using Stream Data Mining Classification Technique
    Desale, Ketan Sanjay
    Kumathekar, Chandrakant Namdev
    Chavan, Arjun Pramod
    1ST INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION ICCUBEA 2015, 2015, : 469 - 473
  • [36] Performance comparison of intrusion detection systems and application of machine learning to Snort system
    Shah, Syed Ali Raza
    Issac, Biju
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 80 : 157 - 170
  • [37] Comparison of different fusion approaches for network intrusion detection using ensemble of RBFNN
    Chan, APF
    Ng, WWY
    Yeung, DS
    Tsang, ECC
    PROCEEDINGS OF 2005 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-9, 2005, : 3846 - 3851
  • [38] Analysis of NSL KDD dataset using classification algorithms for intrusion detection system
    Sharma S.
    Gigras Y.
    Chhikara R.
    Dhull A.
    Recent Patents on Engineering, 2019, 13 (02): : 142 - 147
  • [39] An Adaptive Intrusion Detection System for WSN using Reinforcement Learning and Deep Classification
    Hussain, Saqib
    He, Jingsha
    Zhu, Nafei
    Mughal, Fahad Razaque
    Hussain, Muhammad Iftikhar
    Algarni, Abeer D.
    Ahmad, Sadique
    Zarie, Mira M.
    Ateya, Abdelhamied A.
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2024,
  • [40] Rough Set Significant Reduction and Rules of Intrusion Detection System
    Sulaiman, Noor Suhana
    Abu Bakar, Rohani
    ADVANCES IN DIGITAL TECHNOLOGIES, 2016, 282 : 65 - 76