Intrusion Detection Systems using Linear Discriminant Analysis and Logistic Regression

  title={Intrusion Detection Systems using Linear Discriminant Analysis and Logistic Regression},
  author={Basant Subba and Santosh Biswas and Sushanta Karmakar},
  journal={2015 Annual IEEE India Conference (INDICON)},
Anomaly based Intrusion Detection System (IDS) identifies intrusion by training itself to recognize acceptable behavior of the network. It then raises an alarm whenever any anomalous network behaviors outside the boundaries of its training sets are observed. However, anomaly based IDS are usually prone to high false positive rate due to difficulties involved in defining normal and abnormal network traffic patterns. In this paper, we employ two different statistical methods viz. Linear… CONTINUE READING


Publications citing this paper.
Showing 1-3 of 3 extracted citations

Combination of R1-PCA and median LDA for anomaly network detection

2017 Intelligent Systems and Computer Vision (ISCV) • 2017
View 1 Excerpt

Research on Intrusion Detection Model using ensemble learning methods

2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS) • 2016


Publications referenced by this paper.
Showing 1-10 of 14 references

Principle components analysis and Support Vector Machine based Intrusion Detection System

2010 10th International Conference on Intelligent Systems Design and Applications • 2010
View 12 Excerpts
Highly Influenced

Intrusion Detection using Naive Bayes Classifier with Feature Reduction

S. Mukherjee, N. Sharma
Procedia Technology, vol. 4, no. 0, pp. 119 – 128, 2012. • 2012
View 7 Excerpts
Highly Influenced

Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks

2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing • 2013
View 1 Excerpt

Anomaly intrusion detection based upon data mining techniques and fuzzy logic

2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC) • 2012
View 2 Excerpts

A detailed analysis of the KDD CUP 99 data set

2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications • 2009
View 2 Excerpts

Similar Papers

Loading similar papers…