Affiliation:
1. Research Scholar, DoCSE, Mandsaur University, India 2Head, DoIT, Govt. Polytechnic, Daman, India
Abstract
Research in the field of IDS has been going on since long time; however, there exists a number of ways to further improve the efficiency of IDS. This paper investigates the performance of Intrusion detection system using feature reduction and EBPA. The first step involves the reduction in number of features, based on the combination of information gain and correlation. In the next step, error back propagation algorithm (EBPA) is used to train the network and then analyze the performance. EBPA is commonly used due to its ease of use, high accuracy and efficiency. The proposed model is tested over the KDD Cup 99 and NSL-KDD datasets. Results show that the proposed IDS model with reduced feature set outperforms the other models, both in terms of performance metrics and processing time.
Subject
General Earth and Planetary Sciences,General Environmental Science
Reference67 articles.
1. J. Jabez and B. Muthukumar “Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection Approach”, Proceedings of International Conference on Intelligent Computing, Communication and Convergence (ICCC – 2015), published under Procedia Computer Science, Volume 48, Page 338 – 346, Science Direct, ELSEVIER, 2015.
2. V. Mane and S. Pawar, “Anomaly based IDS using Back Propagation Neural Network”, International Journal of Computer Applications (IJCA) [0975 - 8887], Volume 136, Number 10, Page 29 – 34, February 2016.
3. Rais, Helmi Md, and Tahir Mehmood, “Dynamic Ant Colony System with Three Level Update Feature Selection for Intrusion Detection”. International Journal of Network Security, 20(1), pp. 184-192, 2018.
4. R. Sharma, H. Kalita and P. Borah, “Analysis of Machine Learning Techniques based Intrusion Detection Systems”, Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics, published under Smart Innovation, Systems and Technologies, Volume 44, Page 485 – 493, SPRINGER 2016.
5. Javadzadeh, G., & Azmi, R.: IDuFG: Introducing an Intrusion Detection using Hybrid Fuzzy Genetic Approach. IJ Network Security, 17(6), 754-770. (2015).
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献