Downloads: 111 | Views: 254
Research Paper | Computer Science & Engineering | Iraq | Volume 6 Issue 12, December 2017 | Popularity: 6.7 / 10
Attack Detection Based on Data Mining Techniques
Dr. Buthynna Fahran, Dr. Mohammed Najm, Mustafa Abdulsamea Abdulhamed
Abstract: In light of the security challenges posed by the reality of today, where the Internet and exchange information are an integral part of our daily lives, we live in a world where data requirements have become dynamic, where things are permanently changing. In order to provide security and decrease the damage of information system caused by attacks on the network, it is important to provide it with Intrusion Detection system (IDS). In this paper, we present intrusion detection model based on Feature extraction and two-stage classifier module, designed to detect anomaly activities. The proposed model using Principal Component Analysis (PCA) of Feature extraction to map the high dimensional dataset to a lower one with effective features. We then apply a two-stage classification module utilizing Nave Bayes and C4.5 to identify abnormal behaviors. The experiment results using NSL-KDD dataset shows that Our model outperforms the previous model for detection low-frequency attacks.
Keywords: intrusion detection system, multi-stage classification, anomaly detection, NSL-KDD
Edition: Volume 6 Issue 12, December 2017
Pages: 1547 - 1551
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2246 - 2249Packet Analysis with Network Intrusion Detection System
Rashmi Hebbar, Mohan K
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021
Pages: 1659 - 1668Anomaly Detection: Enhancing Systems with Machine Learning
Yogananda Domlur Seetharama
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024
Pages: 832 - 839Leveraging Artificial Intelligence for Enhanced Cybersecurity: A Systematic Approach
Mohammed Saleem Sultan, Mohammed Shahid Sultan
Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 9 Issue 2, February 2020
Pages: 1921 - 1930Secure Web: Integrating AI Driven Vulnerability Management and Anomaly Detection in AWS Based E - Commerce Platforms
Sai Tarun Kaniganti
Downloads: 4 | Weekly Hits: ⮙3 | Monthly Hits: ⮙4
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 9 Issue 4, April 2020
Pages: 1837 - 1849Decentralization of Big Data with Blockchain
Venkata Naga Sai Kiran Challa