Intrusion Detection System using Ensemble Learning W-AODE and REPTree Algorithm Accuracy Graphs on WEKA
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 8 Issue 1, January 2019

Intrusion Detection System using Ensemble Learning W-AODE and REPTree Algorithm Accuracy Graphs on WEKA

Apoorvi Nagar, Kapil Sharma

With the advancement in information and communication technology (ICT), it has become a vital component of humans life. But this technology has brought a lot of threats in cyber world. These threats increase the chances of network vulnerabilities to attack the system in the network. To avoid these attacks there are various methods in which one is Intrusion Detection System (IDS). In IDS, there are various methods used in data mining and existing technique is not strong enough to detect the attack proficiently. Weighted Average One-Dependence Estimator (WAODE) is an enhanced version of AODE and in this technique; we have to assign weights to each attribute. The dependent attributes having lesser weights by defining the degree of the dependencies. This paper deals with a novel ensemble classifier (WAODE+ RepTree) for intrusion detection system. Proposed ensemble classifier is built using two well-known algorithms WAODE and RepTree. This tree improves accuracy and reduces the error rate. The performance of proposed ensemble classifier (WAODE+ RepTree) is analyzed on Kyoto data set. Proposed ensemble classifier outperforms WAODE and RepTree algorithms and efficiently classifies the network traffic as normal or malicious.

Keywords: Intrusion Detection System, Classification, pre-processing, Weighted Average One-Dependence Estimator, RepTree, Malicious and attacker

Edition: Volume 8 Issue 1, January 2019

Pages: 226 - 231

Share this Article

How to Cite this Article?

Apoorvi Nagar, Kapil Sharma, "Intrusion Detection System using Ensemble Learning W-AODE and REPTree Algorithm Accuracy Graphs on WEKA", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20194107, Volume 8 Issue 1, January 2019, 226 - 231

271 PDF Views | 173 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Intrusion Detection System'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1317 - 1319

A Survey on Usage of Artificial Intelligence Algorithm in Efficiency of WSN

Chaitanya Sharma

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2085 - 2089

Implementation and Analysis of DoS Attack Detection Algorithms

Rupesh Jaiswal, Dr. Shashikant Lokhande, Aditya Gulavani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2025 - 2030

Detection And Mitigation of Distributed Denial of Service Attack by Signature based Intrusion Detection System

Hardik M. Shingala, Mukesh Sakle

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1220 - 1223

EAACK-An Innovative Intrusion Detection System for MANET using Digital Signature

Prof. G. M.Bhandari, Swati Pawar, Varsha Zaware, Ujjawala Bankar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1440 - 1445

Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques

Snehal B Rase, Pranjali Deshmukh

Share this Article

Similar Articles with Keyword 'Classification'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1615 - 1620

Traffic Sign Detection via Graph Based Ranking and Segmentation Algorithm

Premsai Cheedella

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1936 - 1938

A Mining Method to Predict Patients DOSH

Ruchi Rathor, Pankaj Agarkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1869 - 1872

A Technique to Combine Feature Selection with Instance Selection for Effective Bug Triage

Suvarna Kale, Ajay Kumar Gupta

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1642 - 1643

A Survey Paper on Various Encryption & Data Hiding Methods for Video Streams

Shrutika S. Giradkar, Antara Bhattacharya

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2790 - 2794

Risk Distribution and Validation of Data in Passport Data Analysis Using Cluster Analysis

Sucheta Gulia, Dr. Rajan Vohra

Share this Article

Similar Articles with Keyword 'pre-processing'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 143 - 146

Offline Signature Verification Using Contour Tracing

Madhuri, Alok

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 994 - 997

Content Based Image Retrieval: Bone Age Assessment

Manjula Gururaj H, Dr. G. S. Nagaraja

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 4, April 2018

Pages: 1339 - 1341

A Review on Recent Methods to Detect Leaf Disease Symptoms Using Image Processing

Chaitali Pandya, L. K. Sharma

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1979 - 1982

Palm Vein Authentication: A Review

Gitanjali Sikka, Er. Vikas Wasson

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 965 - 969

Identification of Ovarian Mass: A Survey

Hemita Pathak, Vrushali Kulkarni, Sarika Bobde

Share this Article

Similar Articles with Keyword 'Malicious attacker'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1295 - 1299

A Review on Security Attacks in Mobile Ad-hoc Networks

Amandeep Kaur, Dr. Amardeep Singh

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1140 - 1143

Intrusion-Detection System for MANETs

S. Srihari Reddy, S. Z. Parveen

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1220 - 1223

EAACK-An Innovative Intrusion Detection System for MANET using Digital Signature

Prof. G. M.Bhandari, Swati Pawar, Varsha Zaware, Ujjawala Bankar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2105 - 2111

EAACK ? To Overcome from Intruders Attacks in Manet?s by Providing Security Checks

H. Syed Siddiq, M. Hymavathi

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2598 - 2605

Implementation of EAACK Secure Trespass on Detection System for MANETs

S. Krishna Priya, K. V. Srinivasa Rao

Share this Article
Top