As Internet access widens, IDS (Intrusion Detection System) is becoming a very important component of network security to prevent unauthorized use and misuse of data. An IDS routinely handles massive amounts of data traffic that contain redundant and irrelevant features, which impact the performance of the IDS negatively. Feature selection methods play an important role in eliminating unrelated and redundant features in IDS. Statistical analysis, neural networks, machine learning, data mining techniques, and support vector machine models are employed in some such methods. Good feature selection leads to better classification accuracy. Recently, bio-inspired optimization algorithms have been used for feature selection. This work provides a survey of feature selection techniques for IDS, including bio-inspired algorithms.
Nowadays, indexing has become essential for fast retrieval of results. Spatial databases are used in many applications which demand faster retrieval of data. These data are multidimensional. Designing index structure for spatial databases is current area of research. R-Tree is the most widely used index structure for multi-dimensional data. Many variants of R-Tree has evolved with each performing better in some aspect like query retrieval, insertion cost, application specific and so on. In this work, state-of-art of variants in R-Tree is presented. This paper provides an idea of the present development in spatial indexing and paves way for the researchers to explore and analyze the difficulties and trade-offs in the work. The RTree variants are classified according to the way they are different from the original R-Tree either in the process of construction or whether it is a hybrid of R-Tree and some other structure or whether it is an extension of R-Tree to support many other applications.
With the growth of internet world has transformed into a global market with all monetary and business exercises being carried online. Being the most imperative resource of the developing scene, it is the vulnerable object and hence needs to be secured from the users with dangerous personality set. Since the Internet does not have focal surveillance component, assailants once in a while, utilizing varied and advancing hacking topologies discover a path to bypass framework"s security and one such collection of assaults is Intrusion. An intrusion is a movement of breaking into the framework by compromising the security arrangements of the framework set up. The technique of looking at the system information for the conceivable intrusions is known intrusion detection. For the last two decades, automatic intrusion detection system has been an important exploration point. Till now researchers have developed Intrusion Detection Systems (IDS) with the capability of detecting attacks in several available environments; latest on the scene are Machine Learning approaches. Machine learning techniques are the set of evolving algorithms that learn with experience, have improved performance in the situations they have already encountered and also enjoy a broad range of applications in speech recognition, pattern detection, outlier analysis etc. There are a number of machine learning techniques developed for different applications and there is no universal technique that can work equally well on all datasets. In this work, we evaluate all the machine learning algorithms provided by Weka against the standard data set for intrusion detection i.e. KddCupp99. Different measurements contemplated are False Positive Rate, precision, ROC, True Positive Rate.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.