Comparison of Performance for Intrusion Detection System Using Different Rules of Classification

被引:0
|
作者
Sengupta, Nandita [1 ]
Sil, Jaya [2 ]
机构
[1] Univ Coll Bahrain, Manama, Bahrain
[2] Univ Shibpur, Bengal Engn & Sci, Howrah, WB, India
关键词
Classification; Intrusion Detection System; Rough Set Theory; Rules;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Classification is very important for designing intrusion detection system that classifies network traffic data. Broadly traffic data is classified as normal or anomaly. In the work classification performance using rules obtained by different methods are applied on network traffic and compared. Classifier is built based on rules of decision table, conjunctive rule, OneR, PART, JRip, NNge, ZeroR, BayesNet, Ridor from WEKA and using rough set theory. Classification performance is compared applying on KDD data set where the whole data set is divided into training and test data set. Rules are formed using training data set by different rule generation methods and later applied on test data set to calculate accuracy of classifiers.
引用
收藏
页码:87 / +
页数:2
相关论文
共 50 条
  • [41] Performance Analysis of Network Intrusion Detection System using Machine Learning
    Alsaeedi, Abdullah
    Khan, Mohammad Zubair
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (12) : 671 - 678
  • [42] A Performance and Analysis of Misbehaving node in MANET using Intrusion Detection System
    Tamilarasan, S.
    Aramudan
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (05): : 258 - 264
  • [43] Performance Investigation of Principal Component Analysis for Intrusion Detection System Using Different Support Vector Machine Kernels
    Almaiah, Mohammed Amin
    Almomani, Omar
    Alsaaidah, Adeeb
    Al-Otaibi, Shaha
    Bani-Hani, Nabeel
    Al Hwaitat, Ahmad K.
    Al-Zahrani, Ali
    Lutfi, Abdalwali
    Awad, Ali Bani
    Aldhyani, Theyazn H. H.
    ELECTRONICS, 2022, 11 (21)
  • [44] Comparison of Different Classification Algorithms for Landmine Detection using GPR
    Karem, Andrew
    Fadeev, Aleksey
    Frigui, Hichem
    Gader, Paul
    DETECTION AND SENSING OF MINES, EXPLOSIVE OBJECTS, AND OBSCURED TARGETS XV, 2010, 7664
  • [45] CTAR: Classification based on Temporal Class-Association Rules for intrusion detection
    Kim, JS
    Lee, HG
    Seo, S
    Ryu, KH
    INFORMATION SECURITY APPLICATIONS, 2003, 2908 : 84 - 96
  • [46] Computer intrusion detection with classification and anomaly detection, using SVMs
    Fugate, M
    Gattiker, JR
    INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2003, 17 (03) : 441 - 458
  • [47] Classifying the Network Intrusion Attacks using Data Mining Classification Methods and their Performance Comparison
    Srinivasulu, P.
    Nagaraju, D.
    Kumar, P. Ramesh
    Rao, K. Nageswara
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (06): : 11 - 18
  • [48] Minimal complexity attack classification intrusion detection system
    Gowrison, G.
    Ramar, K.
    Muneeswaran, K.
    Revathi, T.
    APPLIED SOFT COMPUTING, 2013, 13 (02) : 921 - 927
  • [49] Network Data Classification Mechanism for Intrusion Detection System
    Jiang, Shuai
    Xu, Xiaolong
    PROCEEDINGS OF THE 2021 IEEE 24TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD), 2021, : 342 - 347
  • [50] An Effective Ensemble Classification Algorithm for Intrusion Detection System
    Wang, Jun-Ping
    Wang, Ti-Ling
    Wu, Yu-Hsuan
    Tsai, Chun-Wei
    RECENT CHALLENGES IN INTELLIGENT INFORMATION AND DATABASE SYSTEMS, ACIIDS 2024, PT I, 2024, 2144 : 51 - 62