Affiliation:
1. Vellore Institute of Technology, India
Abstract
The rapid development of various services that are provided by information technology has been widely accepted by the users who are making use of such services in their day-to-day life activities. Securing such a system application from various intrusions still remains to be a one of the major issues in the current era. Detecting such anomalies from the regular events involves various steps such as data pre-processing, feature selection, and classification. Many of the computational models intend to accurately discriminate the samples of each group for better classification by identifying candidate features prior to the learning phase. This research studies the implementation of a combined feature selection technique such as the GRRF-FWSVM method which is applied to the benchmarked anomaly detection dataset KDD CUP 99. The results prove the novel proposed hybrid model is an effective method in identifying anomalies and it increases the detection rate of about 98.55% of the intrusion detection system with the two most common benchmark models.
Subject
Computer Networks and Communications,Computer Science Applications
Reference29 articles.
1. The neural network models for IDS based on the asymmetric costs of false negative errors and false positive errors
2. Panda, M., &Patra, M. R. (2007). Network intrusion detection using naive Bayes. International journal of computer science and network security, 7(12), 258-263.
3. Data mining-based intrusion detectors
4. Tsai, C. F., Hsu, Y. F., Lin, C. Y., & Lin, W. Y. (2009). Intrusion detection by machine learning: A review. Expert systems with applications, 36(10), 11994-12000.
5. Neural networks-based detection of stepping-stone intrusion
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献