International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 115

Research Paper | Computer Science & Engineering | Sudan | Volume 4 Issue 4, April 2015


Assembly Classifier Approach to Analyze Intrusion Detection Dataset in Networks by Using Data Mining Techniques

Ayad Mohammed Mahyoub Ghaleb | Samani A. Talab


Abstract: The Intrusion Detection system analyzes network traffic to detect the attacks. The attack detection methods used by these systems are of two types anomaly detection and misuse detection methods. Intrusion detection is a type of security management system for computer networks. An Intrusion detection system analyzes information within a computer network to identify possible security breaches, which include both anomaly and misuse. In this paper I studied the performance of number of data mining algorithms and chose best three algorithms for building multi classifier from decision tree classifier, nave Bayes classifier and Multilayer Perceptron classifier. I evaluated performance classifier by account accuracy and error rate.


Keywords: Intrusion Detection, Intrusion Detection System IDS, Probe attacks, Dos Denial of Service attacks, R2L Remote to Local attack, U2R User to Root attack, Weka, NLS-KDD 99 data set


Edition: Volume 4 Issue 4, April 2015,


Pages: 742 - 748


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Ayad Mohammed Mahyoub Ghaleb, Samani A. Talab, "Assembly Classifier Approach to Analyze Intrusion Detection Dataset in Networks by Using Data Mining Techniques", International Journal of Science and Research (IJSR), Volume 4 Issue 4, April 2015, pp. 742-748, https://www.ijsr.net/get_abstract.php?paper_id=SUB153071

Similar Articles with Keyword 'Intrusion Detection'

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar | Mohan K [18]

Share this Article

Downloads: 0

Informative Article, Computer Science & Engineering, India, Volume 11 Issue 8, August 2022

Pages: 1497 - 1500

Innovative Approach to Mitigate Man-in-the-Middle Attacks in Secure Communication Channels

Arnab Dey [8]

Share this Article
Top