Comparison of intrusion detection system based on feature extraction
-
2018-06-08 https://doi.org/10.14419/ijet.v7i2.33.14829 -
IDS, Big Data, Feature Selection, Spark -
Abstract
In network traffic classification redundant feature and irrelevant features in data create problems. All such types of features time-consuming make slow the process of classification and also affect a classifier to calculate accurate decisions such type of problem caused especially when we deal with big data. In this paper, we compare our proposed algorithm with the other IDS algorithm.
Â
Â
-
References
[1] Menu Bijone, A Survey on Secure Network: Intrusion Detection & Prevention Approaches in American Journal of Information Systems Vol. 4, No. 3, 2016, pp 69-88. Do: 10.12691/ages-4-3-2
[2] Mohay, George M. Computer and intrusion forensics. Artech House, 2003.
[3] Nguyen, Hai Thanh, Katrin Franke and Slobodan Petrovic. "Feature Extraction Methods for Intrusion Detection Systems." Threats, Countermeasures, and Advances in Applied Information Security. IGI Global, 2012. 23-52. Web. 13 Feb. 2018. doi:10.4018/978-1-4666-0978-5.ch002
[4] Jupriyadi and A. I. Kistijantoro, "Vitality based feature selection for intrusion detection," 2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA), Bandung, 2014, pp. 93-96.
[5] M. Panda, A. Abraham and M. R. Patra, "Discriminative multinomial Naïve Bayes for network intrusion detection," 2010 Sixth International Conference on Information Assurance and Security, Atlanta, GA, 2010, pp. 5-10.
[6] M. Z. Alom, V. Bontupalli and T. M. Taha, "Intrusion detection using deep belief networks," 2015 National Aerospace and Electronics Conference (NAECON), Dayton, OH, 2015, pp. 339-344.
[7] Heba F. Eid , Mostafa A. Salama , boul Ella Hassanien , Tai-hoon Kim Bi-Layer Behavioral-Based Feature Selection Approach for Network Intrusion Classification†, International Conference on Security Technology SecTech 2011: Security Technology pp 195-203
[8] Eid H.F., Hassanien A.E., Kim T., Banerjee S. (2013) Linear Correlation-Based Feature Selection for Network Intrusion Detection Model. In: Awad A.I., Hassanien A.E., Baba K. (eds) Advances in Security of Information and Communication Networks. Communications in Computer and Information Science, vol 381. Springer, Berlin, Heidelberg.
[9] Laxkar P., Chakrabarti P.,Ghosh A. and Panwar P., “An effective Intrusion Detection System Using Machine Learning Library of Sparkâ€, International Journal of Emerging Technology and Advanced Engineering, 8(2),pp.48-52,2018
-
Downloads
-
How to Cite
Laxkar, P., & Chakrabarti, P. (2018). Comparison of intrusion detection system based on feature extraction. International Journal of Engineering & Technology, 7(2.33), 536-540. https://doi.org/10.14419/ijet.v7i2.33.14829Received date: 2018-06-30
Accepted date: 2018-06-30
Published date: 2018-06-08