We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

A Comparative Study of Intrusion Detection Algorithms

by Ruchi Jain, Anand Singh Rajawat
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 173 - Number 4
Year of Publication: 2017
Authors: Ruchi Jain, Anand Singh Rajawat
10.5120/ijca2017915288

Ruchi Jain, Anand Singh Rajawat . A Comparative Study of Intrusion Detection Algorithms. International Journal of Computer Applications. 173, 4 ( Sep 2017), 25-29. DOI=10.5120/ijca2017915288

@article{ 10.5120/ijca2017915288,
author = { Ruchi Jain, Anand Singh Rajawat },
title = { A Comparative Study of Intrusion Detection Algorithms },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2017 },
volume = { 173 },
number = { 4 },
month = { Sep },
year = { 2017 },
issn = { 0975-8887 },
pages = { 25-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume173/number4/28324-2017915288/ },
doi = { 10.5120/ijca2017915288 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:20:21.858064+05:30
%A Ruchi Jain
%A Anand Singh Rajawat
%T A Comparative Study of Intrusion Detection Algorithms
%J International Journal of Computer Applications
%@ 0975-8887
%V 173
%N 4
%P 25-29
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Intrusion detection system (IDS) is a kind of security management model that can be installed in computers and networks. IDS gather information from the network and computer and analyses it to find the possible security breaches into the system, which contain both intrusions and misuse. If we see modern IDS they also have few vulnerabilities, these systems also have drawbacks of false detection. So we aim to make a new model which can decrease the possibilities of false detection. In this paper we have done a survey of different algorithm used in intrusion detection system and then designed a new model that will use correlation based feature selection algorithm and SVM. This model will be tested on KDDCup99 dataset.

References
  1. Dr. S.Vijayarani1 and Ms. Maria Sylviaa.S, “Intrusion Detection System – A Study” International Journal of Security, Privacy and Trust Management, Volume 4, No 1, February 2015
  2. Uman K Chaudhary, Ioannis Papapanagiotou, Flow classification using clustering and association rule mining.
  3. Jeffrey Erman, Martin Arlitt, Anirban Mahanti, “Traffic Classification Using Clustering Algorithms”, University of Calgary, 2500 University Drive NW, Calgary, AB, Canada
  4. MR Shanmugavadivu, “KDD Cup 99 Dataset” ‎2015
  5. Terry Brugger 15 Sep 2007 KDD Cup '99 dataset (Network Intrusion) considered harmful http://www.kdnuggets.com/news/2007/n18/4i.html
  6. Te-Shun Chou, Kang K. Yen, and Jun Luo Te-Shun Chou, Kang K. Yen, and Jun Luo “Correlation-Based Feature Selection For Intrusion Detection Design”, 2007
  7. Sonali Rathore et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (4) , 2015, 3345-3348, “Intrusion Detection System on KDDCup99 Dataset: A Survey”
  8. Ms. Urvashi Modi, Prof. Anurag Jain. A survey of IDS classification using KDD CUP 99 dataset in WEKA, International Journal of Scientific & Engineering Research, Volume 6, Issue 11, November-2015.
  9. Megha Aggarwal, Amrita, “Performance Analysis Of Different Feature Selection Methods In Intrusion Detection”, International Journal of scientific & technology research volume 2, issue 6, june 2013 ISSN 2277-8616 225 IJSTR©2013 www.ijstr.org
  10. Manjiri V. Kotpalliwar, Rakhi Wajgi, "Classification of Attacks Using Support Vector Machine (SVM) on KDDCUP’99 IDS Database", 2015, Fifth International Conference on Communication Systems and Network Technologies
  11. Building Efficient Intrusion Detection Model Based on Principal Component Analysis and C4.5 You Chen' ,Yang Li' , Xue-Qi Cheng1,Li Guo
  12. Basant Subba , Santosh Biswas, Sushanta Karmakar, "A Neural Network Based System for Intrusion Detection and Attack Classification", 2016
  13. Mr. Vijay D. Katkar, Mr. Siddhant Vijay Kulkarni, "Experiments on Detection of Denial of Service Attacks using Naive Bayesian Classifier" 2013
  14. Vidit Pathak,Dr. Ananthanarayana V. S., " A Novel Multi-Threaded K-Means Clustering Approach for Intrusion Detection" 2012
  15. Hossein Gharaee, Hamid Hosseinvand, “A New Feature Selection IDS based on Genetic Algorithm and SVM” 2016 8th International Symposium on Telecommunications (lST'2016)
Index Terms

Computer Science
Information Sciences

Keywords

NIDS HIDS KDDCUP9 DATASET CFS SVM U2R R2L PROBE DoS