Corpus ID: 16298036

A Study on NSL-KDD Dataset for Intrusion Detection System Based on Classification Algorithms

@inproceedings{Dhanabal2015ASO,
  title={A Study on NSL-KDD Dataset for Intrusion Detection System Based on Classification Algorithms},
  author={L. Dhanabal and S. P. Shantharajah},
  year={2015}
}
Intelligent intrusion detection systems can only be built if there is availability of an effective data set. A data set with a sizable amount of quality data which mimics the real time can only help to train and test an intrusion detection system. The NSL-KDD data set is a refined version of its predecessor KDD‟99 data set. In this paper the NSL-KDD data set is analysed and used to study the effectiveness of the various classification algorithms in detecting the anomalies in the network traffic… Expand
A COMPARATIVE STUDY OF CLASSIFICATION TECHNIQUES FOR INTRUSION DETECTION USING NSL-KDD DATA SETS
Data Mining is a technique to drilling the database for giving meaning to the approachable data. It involves systematic analysis of large data sets. And the classification is used to manage data,Expand
Influence Analysis of Feature Selection to Network Intrusion Detection System Performance Using NSL-KDD Dataset
  • Lukman Hakim, Rahilla Fatma, Novriandi
  • Computer Science
  • 2019 International Conference on Computer Science, Information Technology, and Electrical Engineering (ICOMITEE)
  • 2019
TLDR
The results show that feature selection can enhance the performance of IDS significantly, although it makes a slight reduction inaccuracy. Expand
A Cluster based Hybrid Framework for Network Intrusion Detection
TLDR
A novel hybrid technique based on the combination of both clustering and classification data mining approaches for developing an effective network intrusion detection system (NIDS) with increased accuracy and reduced false alarm rate is presented. Expand
A Survey of Intrusion Detection Models based on NSL-KDD Data Set
TLDR
A generic process flow for anomaly-based IDS is proposed and described and this process flow components are described in the context of related researches carried out using the NSL-KDD data set. Expand
Enhancing Classification of Network Intrusion Attacks using Feature Reduction
In recent years Intrusion detection systems (IDS) considered an important approach to secure the network. The importance of IDS is due to the increasing of unauthorized access and policy violations.Expand
Data Reduction for Optimizing Feature Selection in Modeling Intrusion Detection System
TLDR
Outlier detection is done by a circle generated from the k -means clustering of all selected features, which can significantly improve the classification results in terms of accuracy, detection rate, and precision. Expand
Application of Machine Learning Models for Network Intrusion Detection Systems Based on Feature Selection Approach
The amount of internet usage among the industry has grown rapidly in day to day life. Network intrusion has become the major thread in terms of security and various attacks are affecting the system.Expand
An Efficiency Optimization for Network Intrusion Detection System
With the enormous rise in the usage of computer networks, the necessity for safeguarding these networks is also increased. Network intrusion detection systems (NIDS) are designed to monitor andExpand
A Proposed Model for Dimensionality Reduction to Improve the Classification Capability of Intrusion Protection Systems
TLDR
A new model design based on a combination of feature selection and machine learning algorithms is proposed in this paper, which depends on selected genes from every feature to increase the accuracy of intrusion detection systems. Expand
Attack Detection Based on Data Mining Techniques
In light of the security challenges posed by the reality of today, where the Internet and exchange information are an integral part of our daily lives, we live in a world where data requirements haveExpand
...
1
2
3
4
5
...

References

SHOWING 1-8 OF 8 REFERENCES
A Detailed Analysis on NSL-KDD Dataset Using Various Machine Learning Techniques for Intrusion Detection
TLDR
This paper focuses on detailed study on NSLKDD dataset that contains only selected record that provide a good analysis on various machine learning techniques for intrusion detection. Expand
K-Means Clustering Approach to Analyze NSL-KDD Intrusion Detection Dataset
1 Abstract— Clustering is the most acceptable technique to analyze the raw data. Clustering can help detect intrusions when our training data is unlabeled, as well as for detecting new and unknownExpand
A detail analysis on intrusion detection datasets
TLDR
This work has proposed some data preprocessing techniques such as filling the missing values, removing redundant samples, reducing the dimension, selecting most relevant features and finally, normalize the samples to improve the accuracy and efficiency of theIDS model. Expand
A detailed analysis of the KDD CUP 99 data set
TLDR
A new data set is proposed, NSL-KDD, which consists of selected records of the complete KDD data set and does not suffer from any of mentioned shortcomings. Expand
A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection
TLDR
The experimental results indicate that some anomaly detection schemes appear very promising when detecting novel intrusions in both DARPA’98 data and real network data. Expand
Detection of Attacks in an Intrusion Detection System
Intrusion detection is the act of detecting unwanted traffic on a network or a device. A intrusion detection system (IDS) provides a layer of defense which monitors network traffic for predefinedExpand
Top 10 algorithms in data mining
This paper presents the top 10 data mining algorithms identified by the IEEE International Conference on Data Mining (ICDM) in December 2006: C4.5, k-Means, SVM, Apriori, EM, PageRank, AdaBoost, kNN,Expand
Prof.P.R.Deshmukh,” Detection of Attacks in an Intrusion Detection System
  • International Journal of Computer Science and Information Technologies,
  • 2011