Author:
Kodati Sarangam,Sreekanth Nara,Sarma K.S.R.K.,Reddy P. Chandra Sekhar,Saxena Archana,Narasaiah Boya Palajonna
Abstract
The popularity and rapid growth of the internet have reemphasized the importance of intrusion detection systems (IDS) significance in the network security. IDS decreases hacking, data theft risk, privacy intrusion, and others. To save the system from external and internal intruders, the primary approaches of IDS are used. Many techniques[13], like genetic algorithms, artificial neural networks, and artificial immune systems, have been applied to IDS. This paper describes an Ensemble Framework of Artificial Immune System (AIS) based on Network Intrusion Detection System. Without placing a significant additional load on networks and monitoring systems, the large volume of data is analysed by a network-based Intrusion Detection System (NIDS). For determining the connection type, data from KDD Cup 99 competitions is utilized. To differentiate between attacks and valid connections, IDS can be utilized. Optimized feature selection is used to speed up the time-consuming rough set. The results obtained from the IDS system indicate that it can effectively identify the attacking connections with a high success rate.
Reference18 articles.
1. AshwiniKatkar SakshiShukla, Shaikh Danish, PradipDange, Malware Intrusion Detection For System Security, International Conference on Communication information and Computing Technology (ICCICT), (2021)
2. Rasheed A Abdul, Vulnerability detection towards protecting intrusion by Social Network Analysis approach, 5th International Conference on Trends in Electronics and Informatics (ICOEI), (2021)
3. SibiAmaran R. Mohan Madhan, Intrusion Detection System using Optimal Support Vector Machine for Wireless Sensor Networks, International Conference on Artificial Intelligence and Smart Systems (ICAIS), (2021)
4. Cao Yaofu, Li Xiaomeng, Zhang Shulin, Yang Li, Liang Chen, He Yunrui, Design of network security situation awareness analysis module for electric power dispatching and control system, 2nd International Conference on Information Technology and Computer Application (ITCA), (2020)
5. Prabhu S., Mary Anita E.A., Trust based secure routing mechanisms for wireless sensor networks: A survey, 6th International Conference on Advanced Computing and Communication Systems (ICACCS), (2020)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献