Ensemble of Soft Computing Techniques for Intrusion Detection

Article ID

CSTNWSRN6BV

Ensemble of Soft Computing Techniques for Intrusion Detection

Deepika Veerwal
Deepika Veerwal MPUAT
Naveen Choudhary
Naveen Choudhary
Dharm Singh
Dharm Singh
DOI

Abstract

In the present world scenario network-based computer systems have started to play progressively more vital roles. As a result they have become the main targets of our adversaries. To apply high security against intrusions and attacks, a number of software tools are being currently developed. To solve the problem of intrusion detection a number of pattern recognition and machine learning algorithms has been proposed. The paper states the problem of classifier fusion with soft labels for Intrusion Detection. Performance of Artificial Neural Networks (ANN) and Support Vector Machines (SVM) is presented here. The performance of fusing these classifiers using approaches based on Dempster- Shafer Theory, Average Bayes Combination and Neural Network is proposed. As shown through the experimental results combined classifiers perform better than the individual classifiers.

Ensemble of Soft Computing Techniques for Intrusion Detection

In the present world scenario network-based computer systems have started to play progressively more vital roles. As a result they have become the main targets of our adversaries. To apply high security against intrusions and attacks, a number of software tools are being currently developed. To solve the problem of intrusion detection a number of pattern recognition and machine learning algorithms has been proposed. The paper states the problem of classifier fusion with soft labels for Intrusion Detection. Performance of Artificial Neural Networks (ANN) and Support Vector Machines (SVM) is presented here. The performance of fusing these classifiers using approaches based on Dempster- Shafer Theory, Average Bayes Combination and Neural Network is proposed. As shown through the experimental results combined classifiers perform better than the individual classifiers.

Deepika Veerwal
Deepika Veerwal MPUAT
Naveen Choudhary
Naveen Choudhary
Dharm Singh
Dharm Singh

No Figures found in article.

Deepika Veerwal. 1970. “. Global Journal of Computer Science and Technology – E: Network, Web & Security GJCST-E Volume 13 (GJCST Volume 13 Issue E13): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Issue Cover
GJCST Volume 13 Issue E13
Pg. 43- 47
Classification
Not Found
Article Matrices
Total Views: 25474
Total Downloads: 11144
2026 Trends
Research Identity (RIN)
Related Research
Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Ensemble of Soft Computing Techniques for Intrusion Detection

Deepika Veerwal
Deepika Veerwal MPUAT
Naveen Choudhary
Naveen Choudhary
Dharm Singh
Dharm Singh

Research Journals