Review on Intrusion Detection Using Fuzzy ARTMAP with Feature Selection Technique
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014

Review on Intrusion Detection Using Fuzzy ARTMAP with Feature Selection Technique

Swati Sonawale, Roshani Ade

Considerable research work have been conducted towards Intrusion Detection Systems (IDSs) as well as feature selection. IDS guard a system from attack, misuse, and compromise. It can also screen network activity. Network traffic observing and extent is increasingly regarded as an vital role for understanding and improving the performance and security of our cyber infrastructure. In this research we have proposed framework by using advance feature selection technique & by using dimensionality reduction technique we can reduce IDS data then applying Fuzzy ARTMAP classifier we can find intrusions so that we get accurate results within less time. This technique is very efficient as it saves time as well as storage space.

Keywords: Feature Selection, Intrusion, Redundancy, Fuzzy ARTMAP

Edition: Volume 3 Issue 11, November 2014

Pages: 1215 - 1218

Share this Article

How to Cite this Article?

Swati Sonawale, Roshani Ade, "Review on Intrusion Detection Using Fuzzy ARTMAP with Feature Selection Technique", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=OCT141147, Volume 3 Issue 11, November 2014, 1215 - 1218

46 PDF Views | 40 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Feature Selection'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1869 - 1872

A Technique to Combine Feature Selection with Instance Selection for Effective Bug Triage

Suvarna Kale, Ajay Kumar Gupta

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 3, March 2017

Pages: 1206 - 1209

Improved Fuzzy Rule Based Classification System Using Feature Selection and Bagging for Large Datasets

Akil Kumar A., Mithunkumar P., Kiruthiga R., Anitha R., V. Priya

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2110 - 2113

A Study on Nature - Inspired Approach of Face Recognition

Pooja Khokher

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1815 - 1819

Discriminative Feature Selection by Nonparametric Way with Cluster Validation

Choudari Anantha, Dharmaiah Devarapalli

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1726 - 1728

Improving Software Quality Using Two Stage Cost Sensitive Learning

Ann Joshua

Share this Article

Similar Articles with Keyword 'Intrusion'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1220 - 1223

EAACK-An Innovative Intrusion Detection System for MANET using Digital Signature

Prof. G. M.Bhandari, Swati Pawar, Varsha Zaware, Ujjawala Bankar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 2011 - 2014

Attack Detection and Mitigation for AGC

Pooja A Kulkarni, Harshal A Karande

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2085 - 2089

Implementation and Analysis of DoS Attack Detection Algorithms

Rupesh Jaiswal, Dr. Shashikant Lokhande, Aditya Gulavani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 511 - 516

Graph-based Attack Detection in Cloud using KDD CUP 99 Dataset

Swapnali G. Game, S. B. Natikar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1317 - 1328

An Efficient Approach of Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

Shaik Shanawaz, K. Thyagarajan

Share this Article

Similar Articles with Keyword 'Redundancy'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1742 - 1745

A Novel Routing Based Path Planning Using RSU and OBU for Time Critical Information Sharing

Dr. Raafiya Gulmeher, Javeriya Shabnam

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 1380 - 1385

Voice over Internet Protocol (VoIP) Based IP PBX System Design

Sonali Golhar, V. S. Dhamdhere

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1856 - 1858

A Review On Digital Video Watermarking Using DWT

Shweta Sharma, Sarika Chaudhary

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 5, May 2017

Pages: 1902 - 1905

Scalable Key Termed Based Search System: Experimental Results and Analysis

Bhagyashree Deshmukh, Shyam Gupta

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 820 - 824

Clustering Medical Data Using Subspace and Parallel Approximation Algorithm

B. Thenmozhi, P. Shanthi

Share this Article
Top