Intrusion Detection System using Ensemble Learning W-AODE and REPTree Algorithm Accuracy Graphs on WEKA
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 8 Issue 1, January 2019

Intrusion Detection System using Ensemble Learning W-AODE and REPTree Algorithm Accuracy Graphs on WEKA

Apoorvi Nagar, Kapil Sharma

With the advancement in information and communication technology (ICT), it has become a vital component of humans life. But this technology has brought a lot of threats in cyber world. These threats increase the chances of network vulnerabilities to attack the system in the network. To avoid these attacks there are various methods in which one is Intrusion Detection System (IDS). In IDS, there are various methods used in data mining and existing technique is not strong enough to detect the attack proficiently. Weighted Average One-Dependence Estimator (WAODE) is an enhanced version of AODE and in this technique; we have to assign weights to each attribute. The dependent attributes having lesser weights by defining the degree of the dependencies. This paper deals with a novel ensemble classifier (WAODE+ RepTree) for intrusion detection system. Proposed ensemble classifier is built using two well-known algorithms WAODE and RepTree. This tree improves accuracy and reduces the error rate. The performance of proposed ensemble classifier (WAODE+ RepTree) is analyzed on Kyoto data set. Proposed ensemble classifier outperforms WAODE and RepTree algorithms and efficiently classifies the network traffic as normal or malicious.

Keywords: Intrusion Detection System, Classification, pre-processing, Weighted Average One-Dependence Estimator, RepTree, Malicious and attacker

Edition: Volume 8 Issue 1, January 2019

Pages: 226 - 231

Share this Article

How to Cite this Article?

Apoorvi Nagar, Kapil Sharma, "Intrusion Detection System using Ensemble Learning W-AODE and REPTree Algorithm Accuracy Graphs on WEKA", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20194107, Volume 8 Issue 1, January 2019, 226 - 231

178 PDF Views | 97 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Intrusion Detection System'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1220 - 1223

EAACK-An Innovative Intrusion Detection System for MANET using Digital Signature

Prof. G. M.Bhandari, Swati Pawar, Varsha Zaware, Ujjawala Bankar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 2011 - 2014

Attack Detection and Mitigation for AGC

Pooja A Kulkarni, Harshal A Karande

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 511 - 516

Graph-based Attack Detection in Cloud using KDD CUP 99 Dataset

Swapnali G. Game, S. B. Natikar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2085 - 2089

Implementation and Analysis of DoS Attack Detection Algorithms

Rupesh Jaiswal, Dr. Shashikant Lokhande, Aditya Gulavani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 422 - 426

Secure Detection and Prevention Scheme for Jamming Attack in MANET

Ashwini Magardey, Dr. Tripti Arjariya

Share this Article

Similar Articles with Keyword 'Classification'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1888 - 1890

Spammer Detection and Identification on Social Network Using Machine Learning

Dr. Shameem Akhter, Noorain Saba

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1472 - 1476

Performance Analysis of Diabetes Prediction by using different Machine Learning Algorithms

Aakash Singh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1869 - 1872

A Technique to Combine Feature Selection with Instance Selection for Effective Bug Triage

Suvarna Kale, Ajay Kumar Gupta

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1642 - 1643

A Survey Paper on Various Encryption & Data Hiding Methods for Video Streams

Shrutika S. Giradkar, Antara Bhattacharya

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 3, March 2017

Pages: 1206 - 1209

Improved Fuzzy Rule Based Classification System Using Feature Selection and Bagging for Large Datasets

Akil Kumar A., Mithunkumar P., Kiruthiga R., Anitha R., V. Priya

Share this Article

Similar Articles with Keyword 'pre-processing'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 143 - 146

Offline Signature Verification Using Contour Tracing

Madhuri, Alok

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 1711 - 1716

Live Data Stream Classification for Reducing Query Processing Time: Design and Analysis

Spraha Kamriya, Vandana Kate

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 538 - 541

Simplified Filtering Technique to Edge Reconstruction and Comparison of Original Image in Low to High Density Noise Values

Dr. N. Naveen Kumar, K. Chandra Sekhar, K. Chokkanathan

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 561 - 566

Recognition of Word using different Feature Extraction Methods

Kavita Babalad, Laxmidevi Noolvi, Dr. Jharna Majumdar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 619 - 625

Customized Travel Itinerary Mining for Tourism Services

Bonuguntla Saranya, Miryala Venkatesh

Share this Article

Similar Articles with Keyword 'Malicious attacker'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1220 - 1223

EAACK-An Innovative Intrusion Detection System for MANET using Digital Signature

Prof. G. M.Bhandari, Swati Pawar, Varsha Zaware, Ujjawala Bankar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2105 - 2111

EAACK ? To Overcome from Intruders Attacks in Manet?s by Providing Security Checks

H. Syed Siddiq, M. Hymavathi

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2631 - 2633

Intrusion Detection Techniques with Their Security Mechanisms for Mobile Ad Hoc Networks

Mr. Naveed Zishan, Ashwini Meshram

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1295 - 1299

A Review on Security Attacks in Mobile Ad-hoc Networks

Amandeep Kaur, Dr. Amardeep Singh

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2598 - 2605

Implementation of EAACK Secure Trespass on Detection System for MANETs

S. Krishna Priya, K. V. Srinivasa Rao

Share this Article
Top