An investigation of classification algorithms for intrusion detection system - A quantitative approach

Josy Elsa Varghese, Balachandra Muniyal

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

Nowadays security issues are growing in a tremendous rate. So it is expedient to have a mechanism to keep track of its security issues in the network or host. The Intrusion Detection System (IDS) has a critical part for supervising the networks. The false alarm rate and accuracy are the two important factors to be considered in the design of competent IDS. The role of classification algorithms is indispensable in the decision making of IDS. The redundant and irrelevant features of dataset also affects the performance of classifiers which in turn degrading the evaluation of anomaly detection. The proposed work focuses on the detailed study of different classifiers on two feature selection techniques using NSL-KDD dataset, where Random Forest on Principal Component Analysis (PCA) gives the accuracy rate of 99.52% and false alarm rate is 0.48%.

Original languageEnglish
Title of host publication2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages2045-2051
Number of pages7
Volume2017-January
ISBN (Electronic)9781509063673
DOIs
Publication statusPublished - 30-11-2017
Event2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017 - Manipal, Mangalore, India
Duration: 13-09-201716-09-2017

Conference

Conference2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017
Country/TerritoryIndia
CityManipal, Mangalore
Period13-09-1716-09-17

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Computer Science Applications
  • Information Systems

Fingerprint

Dive into the research topics of 'An investigation of classification algorithms for intrusion detection system - A quantitative approach'. Together they form a unique fingerprint.

Cite this