We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

An Competent Intrusion Detection System using Relevance Vector Machine

by V. Jaiganesh, P. Sumathi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 73 - Number 9
Year of Publication: 2013
Authors: V. Jaiganesh, P. Sumathi
10.5120/12772-9855

V. Jaiganesh, P. Sumathi . An Competent Intrusion Detection System using Relevance Vector Machine. International Journal of Computer Applications. 73, 9 ( July 2013), 27-30. DOI=10.5120/12772-9855

@article{ 10.5120/12772-9855,
author = { V. Jaiganesh, P. Sumathi },
title = { An Competent Intrusion Detection System using Relevance Vector Machine },
journal = { International Journal of Computer Applications },
issue_date = { July 2013 },
volume = { 73 },
number = { 9 },
month = { July },
year = { 2013 },
issn = { 0975-8887 },
pages = { 27-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume73/number9/12772-9855/ },
doi = { 10.5120/12772-9855 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:39:39.984876+05:30
%A V. Jaiganesh
%A P. Sumathi
%T An Competent Intrusion Detection System using Relevance Vector Machine
%J International Journal of Computer Applications
%@ 0975-8887
%V 73
%N 9
%P 27-30
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Nowadays everyone needs Internet for their useful. So internet becomes a public network in the world wide. Intrusion Detection (ID) is the art of detecting inappropriate, incorrect, or anomalous activity. It is a security service that monitors and analyzes system events for the idea of finding, and providing near real-time or real-time notice of, attempts in order to access system resources in an unauthorized manner In proposed system the `relevance vector machine' (RVM), a model of same functional form to the popular and state-of-the-art `support vector machine' (SVM). It demonstrate that by exploiting a probabilistic Bayesian learning framework and it can derive accurate prediction models which typically utilize dramatically fewer basis functions than a comparable SVM. These include the benefits of probabilistic predictions, automatic estimation of `nuisance' parameters and the facility to utilize arbitrary basis functions. The experiment is carried out with the help of MATLAB and WEKA by using KDD Cup 1999 dataset and the results indicate that the proposed technique can achieve higher detection rate and very low false alarm rate than the regular SVM algorithms.

References
  1. Avolio, Frederick M. "A multidimensional approach to internet security. " netWorkervol. 2. 2, April 1998, pp. 15-22.
  2. Vivek K. Kshirsagar, Sonali M. Tidke & Swati Vishnu, "Intrusion Detection System using Genetic Algorithm and Data Mining: An Overview", International Journal of Computer Science and Informatics ISSN (PRINT): 2231 –5292, Vol-1, Iss-4, 2012
  3. D. Anderson, T. Frivold and A. Valdes, "Next-generation intrusion detection expert system (NIDES): a summary", Technical Report SRI-CSL-95-07. Computer Science Laboratory, SRI International, Menlo Park, CA, 1995.
  4. S. Axelsson, "Research in intrusion detection systems: a survey", Technical Report TR 98-17 (revised in 1999). Chalmers University of Technology, Goteborg, Sweden, 1999.
  5. S. Freeman, A. Bivens, J. Branch and B. Szymanski, "Host-based intrusion detection using user signatures", Proceedings of the Research Conference. RPI, Troy, NY, 2002.
  6. K. Ilgun, R. A. Kemmerer and P. A. Porras, "State transition analysis: A rule-based intrusion detection approach", IEEE Trans. Software Eng, Vol. 21, No. 3, Pp. 181–199, 1995.
  7. D. Marchette, "A statistical method for profiling network traffic", Proceedings of the First USENIX Workshop on
  8. Intrusion Detection and Network Monitoring, Santa Clara, CA, Pp. 119–128, 1999.
  9. R. G. Bace, "Intrusion Detection", Macmillan Technical Publishing, 2000.
  10. F. Chuan, P. Jianfeng, Q. Haiyan, and W. R. Jerzy, "Alert fusion for a computer host based intrusion detection system," in Proceedings of the 14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems, 2007, pp. 433-440.
  11. W. Rensheng and V. N. Jeffrey, "Search strategy optimization for intruder detection," IEEE Sensors Journal, Vol. 7, 2007, pp. 315-316.
  12. J. G. Tront and R. C. Marchany, "Internet security: Intrusion detection and prevention in mobile systems," in Proceedings of the 40th Annual Hawaii International Conference on System Sciences, 2007, pp. 162-162.
  13. Mohammadreza Ektefa, Sara Memar, Fatimah Sidi and Lilly Suriani Affendey, "Intrusion Detection Using Data Mining Techniques", IEEE, 2010. ISBN: 978-1-4244-5651-2/10
  14. N. S. Chandolikar1 & V. D. Nandavadekar2, "Comparative Analysis Of Two Algorithms For Intrusion Attack Classification Using Kdd Cup Dataset", International Journal of Computer Science and Engineering (IJCSE) Vol. 1, Issue 1 Aug 2012 81-88 © IASE.
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion Detection System (IDS) Relevance Vector Machine (RVM)