International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 8 Issue 1, January 2019

Intrusion Detection System using Ensemble Learning W-AODE and REPTree Algorithm Accuracy Graphs on WEKA

Apoorvi Nagar, Kapil Sharma

With the advancement in information and communication technology (ICT), it has become a vital component of humans life. But this technology has brought a lot of threats in cyber world. These threats increase the chances of network vulnerabilities to attack the system in the network. To avoid these attacks there are various methods in which one is Intrusion Detection System (IDS). In IDS, there are various methods used in data mining and existing technique is not strong enough to detect the attack proficiently. Weighted Average One-Dependence Estimator (WAODE) is an enhanced version of AODE and in this technique; we have to assign weights to each attribute. The dependent attributes having lesser weights by defining the degree of the dependencies. This paper deals with a novel ensemble classifier (WAODE+ RepTree) for intrusion detection system. Proposed ensemble classifier is built using two well-known algorithms WAODE and RepTree. This tree improves accuracy and reduces the error rate. The performance of proposed ensemble classifier (WAODE+ RepTree) is analyzed on Kyoto data set. Proposed ensemble classifier outperforms WAODE and RepTree algorithms and efficiently classifies the network traffic as normal or malicious.

Keywords: Intrusion Detection System, Classification, pre-processing, Weighted Average One-Dependence Estimator, RepTree, Malicious and attacker

Edition: Volume 8 Issue 1, January 2019

Pages: 226 - 231


How to Cite this Article?

Apoorvi Nagar, Kapil Sharma, "Intrusion Detection System using Ensemble Learning W-AODE and REPTree Algorithm Accuracy Graphs on WEKA", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20194107, Volume 8 Issue 1, January 2019, 226 - 231

135 PDF Views | 69 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Intrusion Detection System'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2025 - 2030

Detection And Mitigation of Distributed Denial of Service Attack by Signature based Intrusion Detection System

Hardik M. Shingala, Mukesh Sakle

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1220 - 1223

EAACK-An Innovative Intrusion Detection System for MANET using Digital Signature

Prof. G. M.Bhandari, Swati Pawar, Varsha Zaware, Ujjawala Bankar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 2011 - 2014

Attack Detection and Mitigation for AGC

Pooja A Kulkarni, Harshal A Karande

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 511 - 516

Graph-based Attack Detection in Cloud using KDD CUP 99 Dataset

Swapnali G. Game, S. B. Natikar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1051 - 1054

An Efficient Network Intrusion Based on Decision Tree Classifier & K-Mean Clustering using Dimensionality Reduction

Vandna Malviya, Anurag Jain

Share this article

Similar Articles with Keyword 'Classification'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 709 - 711

Survey on K-Nearest Neighbor Categorization over Semantically Protected Encrypted Relational Information

Pranali D. Desai, Vinod S. Wadne

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1869 - 1872

A Technique to Combine Feature Selection with Instance Selection for Effective Bug Triage

Suvarna Kale, Ajay Kumar Gupta

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2258 - 2261

A Survey on k-NN Classification over Semantically Secure Encrypted Relational

Mayadevi Kotlapure

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 2004 - 2008

Document Classification Using Part of Speech in Text Mining

Sonam Tripathi, Tripti Sharma

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1983 - 1986

An Improved Hierarchical Technique for Document Clustering

Priti B. Kudal, Prof. Manisha Naoghare

Share this article

Similar Articles with Keyword 'pre-processing'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 143 - 146

Offline Signature Verification Using Contour Tracing

Madhuri, Alok

Share this article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 1711 - 1716

Live Data Stream Classification for Reducing Query Processing Time: Design and Analysis

Spraha Kamriya, Vandana Kate

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1290 - 1294

Face Sketch to Photo Matching Using LFDA and Pre-Processing

Pushpa Gopal Ambhore, Lokesh Bijole

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 538 - 541

Simplified Filtering Technique to Edge Reconstruction and Comparison of Original Image in Low to High Density Noise Values

Dr. N. Naveen Kumar, K. Chandra Sekhar, K. Chokkanathan

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 5, May 2017

Pages: 2530 - 2533

Shadow Attacks Based On Password Patterns Password Reuses

Bhavika Garse, N. D. Kale

Share this article

Similar Articles with Keyword 'Malicious attacker'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1220 - 1223

EAACK-An Innovative Intrusion Detection System for MANET using Digital Signature

Prof. G. M.Bhandari, Swati Pawar, Varsha Zaware, Ujjawala Bankar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1295 - 1299

A Review on Security Attacks in Mobile Ad-hoc Networks

Amandeep Kaur, Dr. Amardeep Singh

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2631 - 2633

Intrusion Detection Techniques with Their Security Mechanisms for Mobile Ad Hoc Networks

Mr. Naveed Zishan, Ashwini Meshram

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1140 - 1143

Intrusion-Detection System for MANETs

S. Srihari Reddy, S. Z. Parveen

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2105 - 2111

EAACK ? To Overcome from Intruders Attacks in Manet?s by Providing Security Checks

H. Syed Siddiq, M. Hymavathi

Share this article

Top