Intrusion-Miner: A Hybrid Classifier for Intrusion Detection using Data Mining
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 4
Abstract
With the rapid growth and usage of internet, number of network attacks have increase dramatically within the past few years. The problem facing in nowadays is to observe these attacks efficiently for security concerns because of the value of data. Consequently, it is important to monitor and handle these attacks and intrusion detection system (IDS) has potentially diagnostic ability to handle these attacks to secure the network. Numerous intrusion detection approaches are presented but the main hindrance is their performance which can be improved by increasing detection rate as well as decreasing false positive rates. Optimizing the performance of IDS is very serious issue and challenging fact that gets more attention from the research community. In this paper, we proposed a hybrid classification approach ‘Intrusion-Miner’ with the help of two classifier algorithm for network anomaly detection to get optimum result and make it possible to detect network attacks. Thus, principal component analysis (PCA) and Fisher Discriminant Ratio (FDR) have been implemented for the feature selection and noise removal. This hybrid approach is compared with J48, Bayesnet, JRip, SMO, IBK and evaluate the performance using KDD99 dataset. Experimental result revealed that the precision of the proposed approach is measured as 96.1 % with low false positive and high false negative rate as compare to other state-of-the-art algorithm. The simulation result evaluation shows that perceptible progress and real-time intrusion detection can be attained as we apply the suggested models to identify diverse kinds of network attacks.
Authors and Affiliations
Samra Zafar, Muhammad Kamran, Xiaopeng Hu
A Recent Study on Routing Protocols in UWSNs
Recent research has seen remarkable advancement in the field of Under Water Sensor Networks (UWSNs). Many different protocols are developed in the recent years in this domain. As these protocols can be categorized in a v...
Image Denoising using Adaptive Thresholding in Framelet Transform Domain
Noise will be unavoidable during image acquisition process and denosing is an essential step to improve the image quality. Image denoising involves the manipulation of the image data to produce a visually high quality im...
A Method for Analyzing and Designing Microservice Holistically
Microservice is a new architecture that is getting attention in the development of service systems. However, microservice is still at the early stage and the acceptance of this architecture is overwhelming. Microservice...
Investigation of Adherence Degree of Agile Requirements Engineering Practices in Non-Agile Software Development Organizations
Requirements are critical for the success of software projects. Requirements are practically difficult to produce, as the hardest stage of building a software system is to decide what the system should do. Moreover, requ...
e-Learning Tools on the Healthcare Professional Social Networks
According to many studies, professional social networks are not widespread in the health care environment, especially doctors. The article is devoted to two advanced digital tools that can attract the image and increase...