DocumentCode :
3080800
Title :
A Comparative Study of Classification Techniques for Intrusion Detection
Author :
Chauhan, Himanshu ; Kumar, Vipin ; Pundir, Sumit ; Pilli, Emmanuel S.
Author_Institution :
Dept. of Comput. Sci. & Eng., Graphic Era Univ., Dehradun, India
fYear :
2013
fDate :
24-26 Aug. 2013
Firstpage :
40
Lastpage :
43
Abstract :
Intrusion detection is one of the major research problems in network security. It is the process of monitoring and analyzing network traffic data to detect security violations. Mining approach can play very important role in developing an intrusion detection system. The network traffic can be classified into normal and anomalous in order to detect intrusions. In our paper, top-ten classification algorithms namely J48, BayesNet, Logistic, SGD, IBK, JRip, PART, Random Forest, Random Tree and REPTree were selected after experimenting with more than twenty most widely used classification algorithms. The comparison of these top-ten classification algorithms is presented in this paper based upon their performance metrics to find out the best suitable algorithm available. Performance of the classification models is measured using 10-fold cross validation. Experiments and assessments of these methods are performed in WEKA environment using NSL-KDD dataset.
Keywords :
Bayes methods; computer network security; data mining; learning (artificial intelligence); pattern classification; telecommunication traffic; trees (mathematics); BayesNet algorithm; IBK algorithm; J48 algorithm; JRip algorithm; NSL-KDD dataset; PART algorithm; REPTree algorithm; SGD algorithm; WEKA environment; anomalous network traffic; classification technique; comparative study; intrusion detection system; logistic algorithm; mining approach; network security; network traffic data analysis; network traffic data monitoring; normal network traffic; random forest algorithm; random tree algorithm; Accuracy; Classification algorithms; Data mining; Decision trees; Intrusion detection; Vegetation; Classification; Data mining; Intrusion Detection; NSL-KDD; WEKA;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computational and Business Intelligence (ISCBI), 2013 International Symposium on
Conference_Location :
New Delhi
Print_ISBN :
978-0-7695-5066-4
Type :
conf
DOI :
10.1109/ISCBI.2013.16
Filename :
6724320
Link To Document :
بازگشت