Anomaly Based Intrusion Detection System Using Soft Computing and Classification Approach

Authors

  • Anuradha S. Varal  Department of Computer Engineering, Modern Education Society College of Engineering, Pune, India
  • Dr. S. K. Wagh  Department of Computer Engineering, Modern Education Society College of Engineering, Pune, India

Keywords:

Intrusion Detection System; Soft Computing; Classification Techniques.

Abstract

Intrusion discovery is prominent up and coming zone, as an ever growing number of complex information is being put away and handled in arranged frameworks. With wide use of internet service, there is constant risk of intrusions and misuse. Thus Intrusion Detection system is most important constituent of computer and its network security. Intrusion Detection System is software centered monitoring mechanism for a computer network that searches presence of wicked activity in the network. IDS system ought to congregated contemplation by sustaining high safety levels safeguarding reliable and secure transmission of the information between different organizations. Intrusion discovery systems categorize computer activities into two main categories: normal and distrustful activities. Many perspectives for intrusion detection have been proposed afore but none displays satisfactory results so we examine for better result in this field. The proposed study likewise takes a diagram of several kinds of arrangement strategies for Intrusion Detection System (IDS). We additionally research in these extraordinary methodologies, their exactness and also false positive proportions.

References

  1. Wagh SK, Pachghare VK, Kolhe SR, "Survey on intrusion detection system using machine learning techniques”, International Journal of Computer Applications. 1;78(16). Jan 2013.
  2. Wagh SK, Kolhe SR, “Effective intrusion detection system using semi-supervised learning”, In Data Mining and Intelligent Computing (ICDMIC), International Conference on 2014 Sep 5 (pp. 1-5). IEEE, 2014.
  3. Wagh S, Khati A, Irani A, Inamdar N, Soni R., “Effective Framework of J48 Algorithm using Semi-Supervised Approach for Intrusion Detection”, International Journal of Computer Applications, 1;94(12),  Jan  2014.
  4. Wagh SK, Kolhe SR., “Effective semi-supervised approach towards intrusion detection system using machine learning techniques”, International Journal of Electronic Security and Digital Forensics, 7(3):290-304,  2015.
  5. Basant Subba , Santosh Biswas, Sushanta Karmakar , “ A Neural Network Based System for Intrusion Detection and Attack Classification”,  IEEE, 2016.
  6. Levent Koc and Alan D. Carswell , “Network Intrusion Detection Using a HNB Binary Classifier”,  IEEE 2015.
  7. Eman Abd EI Raoof Abas, “Artificial immune system based intrusion detection: anomaly detection and feature selection”, IEEE, 2015.
  8. Naila Belhadj Aissa, Mohamed Guerroumi , “A Genetic Clustering Technique for Anomaly-Based Intrusion Detection Systems”,  IEEE,  2015.
  9. Mohammed A. Ambusaidi et. al., “Building an intrusion detection system using a filter-based feature selection algorithm”,  IEEE TRANSACTIONS ON COMPUTERS, VOL., NO , NOVEMBER 2014.
  10. Fatemeh Barani , “A Hybrid Approach for Dynamic Intrusion Detection in Ad Hoc Networks Using Genetic Algorithm and Artificial Immune System” ,  IEEE , 2014.
  11. Salah Eddine Benaicha, Lalia Saoudi, Salah Eddine Bouhouita Guermeche, Ouarda Lounis , “ Intrusion Detection System Using Genetic Algorithm”, Science and Information Conference , 2014.
  12. Alka Chaudhary, Vivekananda Tiwari, Anil Kumar , “A Novel Intrusion Detection System for Ad Hoc Flooding Attack( Using Fuzzy Logic in Mobile AdHoc Networks)”,  IEEE,  2014.
  13. Hachmi Fatma and Limam Mohamed , “A two-stage technique to improve intrusion detection systems based on data mining algorithms”,  IEEE,  2013.
  14. Saeed Khazaee and Maryam Sharifi Rad , “Using fuzzy c-means algorithm for improving intrusion detection performance”,  IEEE,  2013.
  15. Shadi Aljawarneha,, Monther Aldwairi, Muneer Bani Yassein , “Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model”,  Elsevier ,2017.
  16. Eduardo K. Viegas, Altair O. Santin , Luiz S. Oliveira , “Toward a reliable anomaly-based intrusion detection in real-world environments “, Elsevier , 2017.
  17. Amira SayedA. Aziz, Sanaa EL-OlaHanafi, Aboul EllaHassanien, “Comparison of classification techniques applied for network intrusion detection and classification”, Elsevier , 2016.
  18. Weiwei Chen, Fangang Kong, “A Novel     Unsupervised Anomaly Detection Approach for Intrusion Detection System”,  IEEE,  2017.

Downloads

Published

2017-12-31

Issue

Section

Research Articles

How to Cite

[1]
Anuradha S. Varal, Dr. S. K. Wagh, " Anomaly Based Intrusion Detection System Using Soft Computing and Classification Approach, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.1228-1234, November-December-2017.