Analysis of NSL-KDD Dataset for Fuzzy Based Intrusion Detection System
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Survey Paper | Information Technology | India | Volume 3 Issue 6, June 2014

Analysis of NSL-KDD Dataset for Fuzzy Based Intrusion Detection System

Macdonald Mukosera, Thabiso Peter Mpofu, Budwell Masaiti

In a bid to provide useful information for intrusion detection; we focused on analyzing the NSL-KDD dataset. In this analysis; we seek to simplify the process of mining fuzzy rules by reducing the features and categorizing the dataset into various smaller clusters as smaller units of the dataset are easier to work with than the whole single large dataset. It is less complex to observe and discover sound fuzzy rules from a smaller dataset and this work serves as a foundation to a fuzzy logic based intrusion detection system. This paper presents a methodology for data preprocessing towards an intrusion detection system and Microsoft excel was used in the process.

Keywords: Fuzzy rules, fuzzy logic, intrusion, NSL-KDD dataset, mining

Edition: Volume 3 Issue 6, June 2014

Pages: 1479 - 1482

Share this Article

How to Cite this Article?

Macdonald Mukosera, Thabiso Peter Mpofu, Budwell Masaiti, "Analysis of NSL-KDD Dataset for Fuzzy Based Intrusion Detection System", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2014526, Volume 3 Issue 6, June 2014, 1479 - 1482

129 PDF Views | 89 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Fuzzy rules'

Survey Paper, Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 1479 - 1482

Analysis of NSL-KDD Dataset for Fuzzy Based Intrusion Detection System

Macdonald Mukosera, Thabiso Peter Mpofu, Budwell Masaiti

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1576 - 1580

Intrusion Detection in Wireless Network Using Fuzzy Rules

Ketaki P. Bhusari, Swati G. Kale

Share this Article

Research Paper, Information Technology, Iraq, Volume 6 Issue 7, July 2017

Pages: 1006 - 1012

Risk Surveillance Control of Wireless Security Attack with Fuzzy Rules

Dr. Abdulkareeem Merhej Radhi

Share this Article

Similar Articles with Keyword 'fuzzy logic'

Survey Paper, Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 1479 - 1482

Analysis of NSL-KDD Dataset for Fuzzy Based Intrusion Detection System

Macdonald Mukosera, Thabiso Peter Mpofu, Budwell Masaiti

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1783 - 1786

A Fuzzy Reasoning Approach to Determine Various Optimize Paths between Two Locations on a Transport Network Including Nature?s Condition as Factor

Suyash Deore, Rohini Temkar

Share this Article

Research Paper, Information Technology, Kenya, Volume 7 Issue 4, April 2018

Pages: 593 - 598

Intelligent Agents Based Fuzzy Liquidity Management Technique for Mobile Money Transfer

Millicent Murithi, George Okeyo, Michael Kimwele

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1576 - 1580

Intrusion Detection in Wireless Network Using Fuzzy Rules

Ketaki P. Bhusari, Swati G. Kale

Share this Article

Research Paper, Information Technology, India, Volume 2 Issue 11, November 2013

Pages: 66 - 70

Enhancing Recommendation on Customizable E-Commerce System with Association & Ranking

S. Saravanakumar, S. Diviya

Share this Article

Similar Articles with Keyword 'intrusion'

Survey Paper, Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 1479 - 1482

Analysis of NSL-KDD Dataset for Fuzzy Based Intrusion Detection System

Macdonald Mukosera, Thabiso Peter Mpofu, Budwell Masaiti

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 2734 - 2737

Detection of Outliers Using Hybrid Algorithm on Categorical Datasets

Rachana P. Jakkulwar, Prof. R. A. Fadnavis

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 1127 - 1130

Analysis and Data Retrieval by Filtering Packets in High Speed Routers

Indumathi, K. Kumar

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2473 - 2475

Intrusion Detection System with Automatic Forensic Data Acquisition and Firewall

Laimayum Bulbul Sharma, J. Dharani

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1576 - 1580

Intrusion Detection in Wireless Network Using Fuzzy Rules

Ketaki P. Bhusari, Swati G. Kale

Share this Article

Similar Articles with Keyword 'mining'

Research Paper, Information Technology, Afghanistan, Volume 8 Issue 9, September 2019

Pages: 235 - 240

IT Based Land Suitability Modeling for Urban Development Using GIS: A Case Study of Kabul City, Afghanistan

Hazrat Mohammad Wahdaty

Share this Article

Research Paper, Information Technology, Kenya, Volume 9 Issue 12, December 2020

Pages: 881 - 889

Factors Determining Adoption of Block Chain in the Insurance Industry: A Case of Kenya

Kanuku Musyoku, Shitanda Douglas, Nganu Margaret

Share this Article

Survey Paper, Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 1479 - 1482

Analysis of NSL-KDD Dataset for Fuzzy Based Intrusion Detection System

Macdonald Mukosera, Thabiso Peter Mpofu, Budwell Masaiti

Share this Article

Research Paper, Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 1654 - 1660

Privacy Preserving Protocol for Two-Party Classifier Over Vertically Partitioned Dataset Using ANN

Smitha Iddalgave, Sumana M

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 2493 - 2496

An Effective Up-Growth Algorithm for Discovering High Utility Itemset Mining

Anuja Palhade, Rashmi Deshpande

Share this Article
Top