Review on Intrusion Detection Using Fuzzy ARTMAP with Feature Selection Technique
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014

Review on Intrusion Detection Using Fuzzy ARTMAP with Feature Selection Technique

Swati Sonawale, Roshani Ade

Considerable research work have been conducted towards Intrusion Detection Systems (IDSs) as well as feature selection. IDS guard a system from attack, misuse, and compromise. It can also screen network activity. Network traffic observing and extent is increasingly regarded as an vital role for understanding and improving the performance and security of our cyber infrastructure. In this research we have proposed framework by using advance feature selection technique & by using dimensionality reduction technique we can reduce IDS data then applying Fuzzy ARTMAP classifier we can find intrusions so that we get accurate results within less time. This technique is very efficient as it saves time as well as storage space.

Keywords: Feature Selection, Intrusion, Redundancy, Fuzzy ARTMAP

Edition: Volume 3 Issue 11, November 2014

Pages: 1215 - 1218

Share this Article

How to Cite this Article?

Swati Sonawale, Roshani Ade, "Review on Intrusion Detection Using Fuzzy ARTMAP with Feature Selection Technique", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=OCT141147, Volume 3 Issue 11, November 2014, 1215 - 1218

105 PDF Views | 84 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Feature Selection'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1869 - 1872

A Technique to Combine Feature Selection with Instance Selection for Effective Bug Triage

Suvarna Kale, Ajay Kumar Gupta

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 691 - 694

A Survey on Fast Clustering Based Feature Selection Algorithm for High Dimensional Data

Swapnil A. Sutar, Prof. Devendra P. Gadekar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2450 - 2453

Image Classification Using Group Sparse Multiview Patch Alignment Framework Method

Ashok Kakad, Pandhrinath Ghonge

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2309 - 2312

Email Spam Detection Framework with underlined Coefficient Equality Technique

Harikrishna K, Y Siva Prasad

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016

Pages: 1982 - 1986

Enhanced Robust and Reversible Watermarking for Supervised Learning Data

Madhuri V. Gaikwad, Prof. R. A. Kudale

Share this Article

Similar Articles with Keyword 'Intrusion'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1317 - 1319

A Survey on Usage of Artificial Intelligence Algorithm in Efficiency of WSN

Chaitanya Sharma

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2085 - 2089

Implementation and Analysis of DoS Attack Detection Algorithms

Rupesh Jaiswal, Dr. Shashikant Lokhande, Aditya Gulavani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2832 - 2836

Minimization of DDoS Attack using Firecol an Intrusion Prevention System

Bhagyashri Kotame, Shrinivas Sonkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2097 - 2100

Prototype of Computing Device That Aims to Secure User Data on a Compromised OS

Pavan Kulkarni, Aditi Halgekar, Avantika Dhavale, Mehak Daftari, Snehal Wayse

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1689 - 1692

ISRV: Intrusion Detection, Selection of Counter Measures and Recovery of Virtual Network Systems

Vinod Kumar, Syeda Asra, Yallappa Meti

Share this Article

Similar Articles with Keyword 'Redundancy'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1742 - 1745

A Novel Routing Based Path Planning Using RSU and OBU for Time Critical Information Sharing

Dr. Raafiya Gulmeher, Javeriya Shabnam

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3273 - 3277

Homomorphic Encryption & A Novel Key Management Technique to Support Data Aggregation in Mobile Sensing

Farhat Afshan, Shameem Akther

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1856 - 1858

A Review On Digital Video Watermarking Using DWT

Shweta Sharma, Sarika Chaudhary

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1211 - 1215

A Review on Data Mining, Its Applications and Approaches

Anu Verma, Jyoti Arora

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 820 - 824

Clustering Medical Data Using Subspace and Parallel Approximation Algorithm

B. Thenmozhi, P. Shanthi

Share this Article
Top