A Comparative Study on Performance Evaluation of Intrusion Detection System through Feature Reduction for High Speed Networks

1
V. Jyothsn
V. Jyothsn
2
V. Jyothsna
V. Jyothsna
3
V. V. Rama Prasad
V. V. Rama Prasad
1 JNTUH

Send Message

To: Author

GJCST Volume 14 Issue E7

Article Fingerprint

ReserarchID

CSTNWSX06AY

A Comparative Study on Performance Evaluation of Intrusion Detection System through Feature Reduction for High Speed Networks Banner
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

The rapid growth in the usage of the internet had led to many serious security issues in the network. The intrusion detection system (IDS) is one of the sophisticated defensive systems used to detect the malicious activities happening in the network services across the world.Hence, more advanced IDS are been developed in past few years. To improve the performance of the IDS, the system has to be trained effectively to increase the efficiency and decrease the false alarm rate. To train the system the attributes selection plays the major role.This paper evaluates and compares the performance of the intrusion detection systems for different feature reduction techniques in high speed networks.

23 Cites in Articles

References

  1. K Kendall (1998). A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems.
  2. V Jyothsna,V Rama Prasad (2011). A Review of Anomaly based Intrusion Detection Systems.
  3. H Debar,M Dacier,A Wespi (2000). A Revised taxonomy for intrusion detection systems.
  4. S Mukkamala,Sung,Ah (2003). A Comparative Study of Techniques for Intrusion Detection.
  5. P García-Teodoro,J Díaz-Verdejo,G Maciá-Fernández,E Vázquez (2009). Anomaly-based network intrusion detection: Techniques, systems and challenges.
  6. Xin Xu (2006). Adaptive Intrusion Detection Based on Machine Learning: Feature Extraction, Classifier Construction and Sequential Pattern Prediction.
  7. Isabelle Guyon,André Elisseeff (2003). An Introduction to Feature Extraction.
  8. Andrew Sung,Srinivas Mukkamala (2004). The Feature Selection and Intrusion Detection Problems.
  9. Safaa Zaman,Fakhri Karray (2009). Features Selection for Intrusion Detection Systems Based on Support Vector Machines.
  10. Srilatha Chebrolu,Ajith Abraham,Johnson Thomas (2005). Feature deduction and ensemble design of intrusion detection systems.
  11. T Chou,K Yen,J Luo (2008). Network Intrusion Detection Design Using Feature Selection of Soft Computing Paradigms.
  12. Hai Nguyen,Katrin Franke,Slobodan Petrovic (2010). Improving Effectiveness of Intrusion Detection by Correlation Feature Selection.
  13. Mark Hall Correlation-based Feature Selection for Machine Learning.
  14. Jasmina Novakovic (2009). Using Information Gain Attribute Evaluation to Classify Sonar Targets.
  15. B Azhagusundari,Antony Thanamani (2013). Feature Selection based on Information Gain.
  16. R Puttini,Z,L Me (2002). Bayesian classification model for Real time intrusion detection.
  17. Hesham Altwaijry,Saeed Algarny (2012). Bayesian based intrusion detection system.
  18. Xin Xu,Xuening Wang (2005). An Adaptive Network Intrusion Detection Method Based on PCA and Support Vector Machines.
  19. I Lindsay,Smith (2002). A tutorial on Principal Components Analysis.
  20. A B Ahmad,A S Abdulah,K Alghamdi,M Alnfajan,Hussain (2011). Feature Subset Selection for Network Intrusion Detection Mechanism Using Genetic Eigen Vectors.
  21. Jiawei Han,Micheline Kamber (2006). Data mining: Concepts and Techniques.
  22. V Jyothsna,V Rama Prasad (2012). HFO-ANID: Hierarchical Feature Optimization for Anomaly based Network Intrusion Detection.
  23. Mahbod Tavallaee,Ebrahim Bagheri,Wei Lu,Ali Ghorbani (2009). A detailed analysis of the KDD CUP 99 data set.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

V. Jyothsn. 2014. \u201cA Comparative Study on Performance Evaluation of Intrusion Detection System through Feature Reduction for High Speed Networks\u201d. Global Journal of Computer Science and Technology - E: Network, Web & Security GJCST-E Volume 14 (GJCST Volume 14 Issue E7): .

Download Citation

Issue Cover
GJCST Volume 14 Issue E7
Pg. 43- 50
Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Keywords
Classification
Not Found
Version of record

v1.2

Issue date

November 12, 2014

Language

English

Experiance in AR

The methods for personal identification and authentication are no exception.

Read in 3D

The methods for personal identification and authentication are no exception.

Article Matrices
Total Views: 8518
Total Downloads: 2131
2026 Trends
Research Identity (RIN)
Related Research

Published Article

The rapid growth in the usage of the internet had led to many serious security issues in the network. The intrusion detection system (IDS) is one of the sophisticated defensive systems used to detect the malicious activities happening in the network services across the world.Hence, more advanced IDS are been developed in past few years. To improve the performance of the IDS, the system has to be trained effectively to increase the efficiency and decrease the false alarm rate. To train the system the attributes selection plays the major role.This paper evaluates and compares the performance of the intrusion detection systems for different feature reduction techniques in high speed networks.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]
×

This Page is Under Development

We are currently updating this article page for a better experience.

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

A Comparative Study on Performance Evaluation of Intrusion Detection System through Feature Reduction for High Speed Networks

V. Jyothsna
V. Jyothsna
V. V. Rama Prasad
V. V. Rama Prasad

Research Journals