Analysis of NSL-KDD Dataset for Fuzzy Based Intrusion Detection System
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Survey Paper | Information Technology | India | Volume 3 Issue 6, June 2014

Analysis of NSL-KDD Dataset for Fuzzy Based Intrusion Detection System

Macdonald Mukosera, Thabiso Peter Mpofu, Budwell Masaiti

In a bid to provide useful information for intrusion detection; we focused on analyzing the NSL-KDD dataset. In this analysis; we seek to simplify the process of mining fuzzy rules by reducing the features and categorizing the dataset into various smaller clusters as smaller units of the dataset are easier to work with than the whole single large dataset. It is less complex to observe and discover sound fuzzy rules from a smaller dataset and this work serves as a foundation to a fuzzy logic based intrusion detection system. This paper presents a methodology for data preprocessing towards an intrusion detection system and Microsoft excel was used in the process.

Keywords: Fuzzy rules, fuzzy logic, intrusion, NSL-KDD dataset, mining

Edition: Volume 3 Issue 6, June 2014

Pages: 1479 - 1482

Share this Article

How to Cite this Article?

Macdonald Mukosera, Thabiso Peter Mpofu, Budwell Masaiti, "Analysis of NSL-KDD Dataset for Fuzzy Based Intrusion Detection System", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2014526, Volume 3 Issue 6, June 2014, 1479 - 1482

58 PDF Views | 39 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Fuzzy rules'

Survey Paper, Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 1479 - 1482

Analysis of NSL-KDD Dataset for Fuzzy Based Intrusion Detection System

Macdonald Mukosera, Thabiso Peter Mpofu, Budwell Masaiti

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1576 - 1580

Intrusion Detection in Wireless Network Using Fuzzy Rules

Ketaki P. Bhusari, Swati G. Kale

Share this Article

Research Paper, Information Technology, Iraq, Volume 6 Issue 7, July 2017

Pages: 1006 - 1012

Risk Surveillance Control of Wireless Security Attack with Fuzzy Rules

Dr. Abdulkareeem Merhej Radhi

Share this Article

Similar Articles with Keyword 'fuzzy logic'

Survey Paper, Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 1479 - 1482

Analysis of NSL-KDD Dataset for Fuzzy Based Intrusion Detection System

Macdonald Mukosera, Thabiso Peter Mpofu, Budwell Masaiti

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1783 - 1786

A Fuzzy Reasoning Approach to Determine Various Optimize Paths between Two Locations on a Transport Network Including Nature?s Condition as Factor

Suyash Deore, Rohini Temkar

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1576 - 1580

Intrusion Detection in Wireless Network Using Fuzzy Rules

Ketaki P. Bhusari, Swati G. Kale

Share this Article

Research Paper, Information Technology, India, Volume 2 Issue 11, November 2013

Pages: 66 - 70

Enhancing Recommendation on Customizable E-Commerce System with Association & Ranking

S. Saravanakumar, S. Diviya

Share this Article

Research Paper, Information Technology, Kenya, Volume 7 Issue 4, April 2018

Pages: 593 - 598

Intelligent Agents' Based Fuzzy Liquidity Management Technique for Mobile Money Transfer

Millicent Murithi, George Okeyo, Michael Kimwele

Share this Article

Similar Articles with Keyword 'intrusion'

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 2734 - 2737

Detection of Outliers Using Hybrid Algorithm on Categorical Datasets

Rachana P. Jakkulwar, Prof. R. A. Fadnavis

Share this Article

Survey Paper, Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 1479 - 1482

Analysis of NSL-KDD Dataset for Fuzzy Based Intrusion Detection System

Macdonald Mukosera, Thabiso Peter Mpofu, Budwell Masaiti

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1990 - 1993

Advanced Persistent Threat Detection System

Hanu Prasannan, Dharani.J

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2473 - 2475

Intrusion Detection System with Automatic Forensic Data Acquisition and Firewall

Laimayum Bulbul Sharma, J. Dharani

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 586 - 589

Intrusion Detection using Security Onion Based on Kill Chain Approach

Beatrice Ssowmiya J, Prabhakaran S

Share this Article

Similar Articles with Keyword 'mining'

Research Paper, Information Technology, Afghanistan, Volume 8 Issue 9, September 2019

Pages: 235 - 240

IT Based Land Suitability Modeling for Urban Development Using GIS: A Case Study of Kabul City, Afghanistan

Hazrat Mohammad Wahdaty

Share this Article

Comparative Studies, Information Technology, India, Volume 5 Issue 4, April 2016

Pages: 2013 - 2019

Comprehensive Research on Privacy Preserving Emphasizing on Distributed Clustering

Prajna M.S., Sumana M.

Share this Article

Survey Paper, Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 1479 - 1482

Analysis of NSL-KDD Dataset for Fuzzy Based Intrusion Detection System

Macdonald Mukosera, Thabiso Peter Mpofu, Budwell Masaiti

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 3141 - 3144

Interrelated Document Warehouse Report Visualization

V. Vivek, N. J. Subashini

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1076 - 1079

Parallelizing Coherent Rule Mining Algorithm on CUDA

Aditya A. Davale, Shailendra W. Shende

Share this Article
Top