Open Access   Article Go Back

Intrusion Detection System Using Hybrid Classification Technique

R. Wankhede1 , V. Chole2

Section:Research Paper, Product Type: Journal Paper
Volume-4 , Issue-11 , Page no. 30-33, Nov-2016

Online published on Nov 29, 2016

Copyright © R. Wankhede, V. Chole . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: R. Wankhede, V. Chole, “Intrusion Detection System Using Hybrid Classification Technique,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.11, pp.30-33, 2016.

MLA Style Citation: R. Wankhede, V. Chole "Intrusion Detection System Using Hybrid Classification Technique." International Journal of Computer Sciences and Engineering 4.11 (2016): 30-33.

APA Style Citation: R. Wankhede, V. Chole, (2016). Intrusion Detection System Using Hybrid Classification Technique. International Journal of Computer Sciences and Engineering, 4(11), 30-33.

BibTex Style Citation:
@article{Wankhede_2016,
author = {R. Wankhede, V. Chole},
title = {Intrusion Detection System Using Hybrid Classification Technique},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2016},
volume = {4},
Issue = {11},
month = {11},
year = {2016},
issn = {2347-2693},
pages = {30-33},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1100},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1100
TI - Intrusion Detection System Using Hybrid Classification Technique
T2 - International Journal of Computer Sciences and Engineering
AU - R. Wankhede, V. Chole
PY - 2016
DA - 2016/11/29
PB - IJCSE, Indore, INDIA
SP - 30-33
IS - 11
VL - 4
SN - 2347-2693
ER -

VIEWS PDF XML
1710 1586 downloads 1491 downloads
  
  
           

Abstract

Cyber Security is one of the key elements of any system. Breaching of cyber security can lead to loss of confidential and private data. To prevent the attacks on network an Intrusion Detection System Using Hybrid Classification Technique is proposed. This IDS uses a decision tree algorithm to classify the known attack types in the dataset and SVM is used to classify the normal data from the dataset, there by detecting the unknown attacks. Dataset used is the NSL-KDD Dataset.

Key-Words / Index Term

AdTree, SVM, NSL-KDD, IDS

References

[1] Rajesh Wankhede and Vikrant Chole (2016), Intrusion Detection System using Classification technique, International Journal of Computer Applications (0975 � 8887) Volume 139 � No.11, pp. 25-28.
[2] Gisung Kim and Seungmin Lee (2014), A Novel Hybrid Intrusion Detection Method Integrating Anomaly Detection With Misuse Detection, ELSEVIER, Expert Systems with Applications vol. 41 pp. 1690 � 1700.
[3] Zhi-Song Pan, Song-Can Chen, Gen-Bao Hu, DaoQiang Zhang, (2010), ―Hybrid Neural Network and C4.5 for Misuse Detection ‖, Proceedings of the second International conference on Machine Learning and Cybernetics, November, pp. 2463 � 2467.
[4] H.F. Eid, A. Darwish A. H. Ella and A. Abraham, ―Principle components analysis and Support Vector Machine based Intrusion Detection System,‖ 2010, 10th International Conference on Intelligent Systems Design and Applications (ISDA), 2010.
[5] Tsang, C. H., Kwong, S., & Wang, H.,‖ Genetic-fuzzy rule reordering in mining approach and evaluation of feature selection techniques for anomaly intrusion detection‖, Pattern Recognition,40 (9), pp. 2373�2391, 2007. .
[6] Juan Wang, Qiren Yang, Dasen Ren, ―An intrusion detection algorithm based on decision tree technology‖, In the Proc. of IEEE Asia-Pacific Conference on Information Processing, 2009.
[7] M. Revathi, T.Ramesh - Network Intrusion Detection Sysytem using reduced dimentioality Indian Journal of Computer Science and Engineering (IJCSE), Vol. 2 No. 1, pp . 61-67.
[8] Yonav Freund et.al, ―The Alternating Decision Tree Algorithm‖, ICML �99 Proceedings of the Sixteenth International Conference on Machine Learning, pp 124-133.
[9] Tavallaee M, Bagheri E, Lu W, Ghorbani A. ―A detailed analysis of the KDD CUP 99 data set‖, IEEE Symposium on Computational intelligence for security and defense applications, 2009,pp 1-6.
[10] Hong Kuan Sok et.al, ―Using the ADTree for Feature Reduction through Knowledge Discovery‖ Instrumentation and Measurement Technology Conference (I2MTC), 2013 IEEE International ,pp1040 � 1044.
[11] Mrutyunjaya Panda and Manas Ranjan Patra, ―A Comparative Study Of Data Mining Algorithms For Network Intrusion Detection‖, First International Conference on Emerging Trends in Engineering and Technology, pp 504-507, IEEE, 2008.
[12] Shi-Jinn Horng and Ming-Yang Su (2011), ―Novel Intrusion Detection System Based On Hierarchical Clustering and Support Vector Machines‖, ELSEVIER, Expert Systems with Applications. pp. 38 306-313.