DocumentCode :
3080827
Title :
Enhancing Performance of Intrusion Detection through Soft Computing Techniques
Author :
Patra, M.R. ; Panigrahi, A.
Author_Institution :
Dept. of Comput. Sci., Berhampur Univ., Berhampur, India
fYear :
2013
fDate :
24-26 Aug. 2013
Firstpage :
44
Lastpage :
48
Abstract :
The worldwide rapid expansion of computer networks and ever growing dependence of organizations on network based information management have led to serious security concerns. Among other security threats network intrusion has been a major concern which requires considerable attention in order to protect the information resources that are accessible via network infrastructure. Though different intrusion detection approaches have been experimented but none of them can guarantee complete protection against network intrusions. Furthering research in this direction, we have been exploring the use of soft computing techniques to analyze intrusion data in order to detect intrusive behavior in network access patters. In this paper, we have carried out some experiments using techniques such as Radial Basis Function Network (RBFN), Self-Organizing Map (SOM), Support Vector Machine (SVM), back propagation, and J48 on the NSL-KDD intrusion data set in order to evaluate the performance of each of the techniques. We have also compared the performance of these techniques with respect to the detection and false alarm rates.
Keywords :
backpropagation; computer network security; radial basis function networks; self-organising feature maps; support vector machines; J48; NSL-KDD intrusion data set; RBFN; SOM; SVM; back propagation; computer networks; false alarm rates; intrusion data; intrusion detection performance enhancement; intrusive behavior; network access patters; network based information management; network intrusion; radial basis function network; security concerns; self-organizing map; soft computing techniques; support vector machine; Accuracy; Intrusion detection; Neurons; Principal component analysis; Radial basis function networks; Support vector machines; Training; Intrusion detection; performance evaluation; soft computing techniques;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computational and Business Intelligence (ISCBI), 2013 International Symposium on
Conference_Location :
New Delhi
Print_ISBN :
978-0-7695-5066-4
Type :
conf
DOI :
10.1109/ISCBI.2013.17
Filename :
6724321
Link To Document :
بازگشت