Network Intrusion Detection system based on Feature Selection and Triangle area Support Vector Machine
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2012, Vol 3, Issue 4
Abstract
:As the cost of the data processing and Internet accessibility increases, more and more organizations are becoming vulnerable to a wide range of cyber threats. Most current offline intrusion detection systems are focused on unsupervised and supervised machine learning approaches. Existing model has high error rate during the attack classification using support vector machine learning algorithm. Besides, with the study of existing work, feature selection techniques are also essential to improve high efficiency and effectiveness. Performance of different types of attacks detection should also be improved and evaluated using the proposed approach. In this proposed system, Information Gain (IG) and Triangle Area based KNN are used for selecting more discriminative features by combining Greedy k-means clustering algorithm and SVM classifier to detect Network attacks. This system achieves high accuracy detection rate and less error rate of KDD CUP 1999 training data set
Authors and Affiliations
Venkata Suneetha Takkellapati1 , G. V. S. N. R. V Prasad2
32 Bit Parallel Multiplier Using VHDL
In this paper, design of 32-bit parallel multiplier is presented, by introducing Carry Save Adder (CSA) in partial product lines. The multiplier given in this paper is modeled using VHDL (Very High Speed Integration Hard...
A Review on Security of Fingerprint Template Using Fingerprint Mixing
Biometric recognition systems are becoming powerful means for automatic personal recognition. Nowadays, fingerprints are widely used in biometric recognition systems. In the 21 st century, having your identity stolen is...
Illumination, Expression and Occlusion Invariant Pose-Adaptive Face Recognition System for Real-Time Applications
Face recognition in real-time scenarios is mainly affected by illumination, expression and pose variations and also by occlusion. This paper presents the framework for pose-adaptive component-based face recognition syste...
Energy-Efficient Localized Routing in Wireless Sensor Networks
Every sensor node is essential to know their location in the sensor network, even in the presence of malicious adversaries. In that the energy conservation and scalability are critical issues in wireless sensor net...
Effect of Reinforcement on Abrasive wear of Different Aluminium based Metal Matrix Composite-A Review
Aluminium alloys are the most widely used nonferrous materials in engineering applications owing to their attractive properties such as high strength to weight ratio, good ductility, excellent corrosion resistance, avail...