CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET

@article{ElSappagh2019CLASSIFICATIONPF,
  title={CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET},
  author={Shaker H. Ali El-Sappagh and Ahmed saad Mohammed and Tarek Ahmed AlSheshtawy},
  journal={International Journal of Network Security \& Its Applications},
  year={2019}
}
In network security framework, intrusion detection is one of a benchmark part and is a fundamental way to protect PC from many threads. The huge issue in intrusion detection is presented as a huge number of false alerts; this issue motivates several experts to discover the solution for minifying false alerts according to data mining that is a consideration as analysis procedure utilized in a large data e.g. KDD CUP 99. This paper presented various data mining classification for handling false… Expand
3 Citations
Ensemble classification for intrusion detection via feature extraction based on deep Learning
TLDR
This paper adopts ensemble models in order to improve the performance of intrusion detection and, at the same time, decrease the false alarm rate, and indicates the superiority in terms of prominent metrics Accuracy, Precision, Recall, and F-measure. Expand
GOAMLP: Network Intrusion Detection With Multilayer Perceptron and Grasshopper Optimization Algorithm
TLDR
The GOAMLP method outperforms and is more accurate than the existing state-of-the-art techniques such as RF, XGBoost, and embedded learning of ANN with BOA, HHO, and BWO algorithms in network intrusion detection. Expand
Detection of dos attacks using naive bayes method based on internet of things (iot)
Internet of Things (IoT) is a technology that is currently on a trend. Interconnecting networks on IoT are useful in the automation process, but it has vulnerabilities to network-based disruptionsExpand

References

SHOWING 1-10 OF 55 REFERENCES
Application of Data Mining to Network Intrusion Detection: Classifier Selection Model
TLDR
Evaluated performance of a comprehensive set of classifier algorithms using KDD99 dataset indicates that noticeable performance improvement and real-time intrusion detection can be achieved as the proposed models to detect different kinds of network attacks are applied. Expand
EVALUATING MACHINE LEARNING ALGORITHMS FOR DETECTING NETWORK INTRUSIONS
TLDR
This paper proposes machine learning algorithms such as Random Forest and AdaBoost, along with Naive Bayes, to build an efficient intrusion detection model and shows that the choice of any data mining algorithm is a compromise among the time taken to build the model, detection rate and low false alarm rate. Expand
Combining Naive Bayes and Decision Tree for Adaptive Intrusion Detection
In this paper, a new learning algorithm for adaptive network intrusion detection using naive Bayesian classifier and decision tree is presented, which performs balance detections and keeps falseExpand
Network intrusion detection system using various data mining techniques
TLDR
This research paper includes the implementation of different data mining algorithms including Linear regression and K-Means Clustering to automatically generate the rules for classify network activities to protect the data's confidentiality and integrity. Expand
A New Data-Mining Based Approach for Network Intrusion Detection
TLDR
This paper proposes a new data-mining based technique for intrusion detection using an ensemble of binary classifiers with feature selection and multiboosting simultaneously, which improves the detection of attacks that occur less frequently in the training data. Expand
Network Intrusion Detection using Clustering: A Data Mining Approach
TLDR
A system that is able to detect the network intrusion using clustering concept which uses data mining technique to reduce the false alarm rate and improves the security. Expand
Intrusion detection using clustering
In increasing trends of network environment every one gets connected to the system. So there is need of securing information, because there are lots of security threats are present in networkExpand
An active learning based TCM-KNN algorithm for supervised network intrusion detection
TLDR
A novel supervised network intrusion detection method based on TCM-KNN (Transductive Confidence Machines for K-Nearest Neighbors) machine learning algorithm and active learning based training data selection method that can effectively detect anomalies with high detection rate, low false positives and can be further optimized as discussed in this paper for real applications. Expand
Intrusion detection using fuzzy association rules
TLDR
A novel framework based on data mining techniques is proposed for designing an IDS that uses fuzzy association rules for building classifiers and outperforms other methods, specially in terms of false positive rate. Expand
An Empirical Comparison of Classifiers to Analyze Intrusion Detection
  • Preeti Aggarwal, S. Sharma
  • Computer Science
  • 2015 Fifth International Conference on Advanced Computing & Communication Technologies
  • 2015
TLDR
This paper aims to first select ten classification algorithms based on their efficiency in terms of speed, capability to handle large dataset and dependency on parameter tuning and then simulates the ten selected existing classifiers on a data mining tool Weka for KDD'99 dataset. Expand
...
1
2
3
4
5
...