Rate the Article: Assembly Classifier Approach to Analyze Intrusion Detection Dataset in Networks by Using Data Mining Techniques, IJSR, Call for Papers, Online Journal
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Downloads: 115 | Views: 406

Research Paper | Computer Science & Engineering | Sudan | Volume 4 Issue 4, April 2015 | Rating: 6.6 / 10


Assembly Classifier Approach to Analyze Intrusion Detection Dataset in Networks by Using Data Mining Techniques

Ayad Mohammed Mahyoub Ghaleb, Samani A. Talab


Abstract: The Intrusion Detection system analyzes network traffic to detect the attacks. The attack detection methods used by these systems are of two types anomaly detection and misuse detection methods. Intrusion detection is a type of security management system for computer networks. An Intrusion detection system analyzes information within a computer network to identify possible security breaches, which include both anomaly and misuse. In this paper I studied the performance of number of data mining algorithms and chose best three algorithms for building multi classifier from decision tree classifier, nave Bayes classifier and Multilayer Perceptron classifier. I evaluated performance classifier by account accuracy and error rate.


Keywords: Intrusion Detection, Intrusion Detection System IDS, Probe attacks, Dos Denial of Service attacks, R2L Remote to Local attack, U2R User to Root attack, Weka, NLS-KDD 99 data set


Edition: Volume 4 Issue 4, April 2015,


Pages: 742 - 748



Rate this Article


Select Rating (Lowest: 1, Highest: 10)

5

Your Comments (Only high quality comments will be accepted.)

Characters: 0

Your Full Name:


Your Valid Email Address:


Verification Code will appear in 2 Seconds ... Wait

Top