2012 Ninth International Conference on Wireless and Optical Communications Networks (WOCN) 2012
DOI: 10.1109/wocn.2012.6335546
|View full text |Cite
|
Sign up to set email alerts
|

Efficient algorithm for intrusion attack classification by analyzing KDD Cup 99

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 27 publications
(20 citation statements)
references
References 2 publications
0
20
0
Order By: Relevance
“…In this workvarious attacks like DOS, R2L, U2R Prob and normal packet during capturing packet in real time Network in NIDS mode are obtained [9]. Where HIDS focuses on two attributes like log in log out time and login details.…”
Section: Results Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…In this workvarious attacks like DOS, R2L, U2R Prob and normal packet during capturing packet in real time Network in NIDS mode are obtained [9]. Where HIDS focuses on two attributes like log in log out time and login details.…”
Section: Results Analysismentioning
confidence: 99%
“…So there is a probability that produced result can differ from original results. But propose IDS using knowledge of KDD's 99 data set [8,9,12] in which we have study of all type of normal and abnormal behaviors of packets along with 41 attribute defined in KDD'99 data set, after that we have select 8 attribute (see Table 1) from 41 attribute which play important role during identification of intrusion in captured packets [12]. It is clear from produced results that 8 attributes out of the 41 attributes of the captured packets from network have a significance value higher than zero, and the rest have a significance of zero and hence not selected for the results.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…This chapter propagandize the comprehensive analysis over diversified detection methodologies [8][9][10] which intricate with the scheming of detection accuracy acquired from Host-based network traffic. As per literature concerned, utilizing the support vector machine from classifier based techniques and optimization algorithm from evolutionary techniques in designing the intrusion detection systems makes the researchers widely impressive to design the diversified setups as neither single nor hybrid approaches.…”
Section: Literature Surveymentioning
confidence: 99%
“…Chandolikar and Nandavadekar [10] have evaluated the performance of J48 classification algorithm based on the correctly classified instances, Mean Absolute Error (MAE), Root Mean Squared Error (RMSE), Root relative squared error and kappa statistics measures. They have applied feature selection on KDD cup data set before evaluating the performance of the algorithm.…”
Section: Related Workmentioning
confidence: 99%