Host based Intrusion Detection System HIDS

  • et al.
N/ACitations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper presents the data analysis and feature extraction of KDD dataset of 1999. This is used to detect signature based and anomaly attacks on a system. The process is supported by data extraction as well as data cleaning of the above mentioned data set. The dataset consists of 42 parameters and 58 services. These parameters are further filtered to extract useful attributes. Every attack in the dataset is labeled either with “normal” or into four different attack types i.e. denial-of-service, network probe, remote-to-local or user-to-root. Using different machine learning algorithms, the work tries to compare the individual accuracy, True Positive and False positive rate of every algorithm with every other algorithm. The work focuses its attention to increase security through detection of static as well as dynamic attack.

Cite

CITATION STYLE

APA

Yadav, A., Srivastav, A., … Singh, K. V. (2020). Host based Intrusion Detection System HIDS. International Journal of Engineering and Advanced Technology, 9(5), 1043–1049. https://doi.org/10.35940/ijeat.e9903.069520

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free