2016
DOI: 10.5121/ijcsit.2016.8102
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection Using Feature Selection and Machine Learning Algorithm with Misuse Detection

Abstract: In order to avoid illegitimate use of any intruder, intrusion detection over the network is one of the critical issues. An intruder may enter any network or system or server by intruding malicious packets into the system in order to steal, sniff, manipulate or corrupt any useful and secret information, this process is referred to as intrusion whereas when packets are transmitted by intruder over the network for any purpose of intrusion is referred to as attack. With the expanding networking technology, million… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(11 citation statements)
references
References 6 publications
0
11
0
Order By: Relevance
“…In the research of intrusion detection, redundant features can degrade detection performance, so more and more researchers focus on feature selection [2,16,18,20]. The process of feature selection in this paper is similar to the data sampling.…”
Section: Feature Selectionmentioning
confidence: 99%
See 1 more Smart Citation
“…In the research of intrusion detection, redundant features can degrade detection performance, so more and more researchers focus on feature selection [2,16,18,20]. The process of feature selection in this paper is similar to the data sampling.…”
Section: Feature Selectionmentioning
confidence: 99%
“…IDSs are generally classified into two categories: signature-based and anomaly-based detection systems [1]. Signature-based intrusion detection systems [2,3], such as Snort intrusion detection systems [3], are designed to detect intrusion by building anomaly behavior character libraries and matching network data. These IDSs have high detection rate, but they are difficult to identify new attacks in the network.…”
Section: Introductionmentioning
confidence: 99%
“…For attributes assessment, DT is produced originally based on feature values achieved through training data. The classification of data examples can be made based on attributes influence by trained test data [12]. Random Forest is a supervised learning classifier which based on a group of three analysts.…”
Section: B J48 and Random Forestmentioning
confidence: 99%
“…ere are mainly two types of intrusion detection techniques based on the approach followed for detecting network intrusion: signature and anomaly-based intrusion detection model [6,7]. On the basis of a computer system, anomaly-based intrusion detection approach identifies abnormal behavior of the network traffic by creating baseline on the normal behavior of network traffics.…”
Section: Introductionmentioning
confidence: 99%