Comparative analysis of classification techniques in network based intrusion detection systems

4Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

An Intrusion Detection System (IDS) monitors the system events and examines the log files in order to detect the security problem. In this paper, we analyze the classification algorithms, especially Entropy based classification, Naïve classifier, and J48 using KDD-CUP’99 dataset to detect the different types of attacks. The KDD-Cup’99 dataset is a standard dataset for analysing these type of classification techniques. In KDD-CUP’99 dataset, each instance corresponds to either attack or normal connection. The KDD-Cup’99 dataset contains mainly four types of attack, namely, DOS, U2R, R2L, Probe and these four types of attacks also have subcategories attacks. In this paper, we carry out simulations on the KDD-Cup’99 dataset for all four types of attacks and their subcategories. The back, land, Neptune, pod, smurf, teardrop belong to DoS; the rootkit, Perl, loadmodule, buffer-overflow belong to U2R; the FTP-write, spy, phf, guess-passwd, imap, warezclient, warezmaster, multihop belong to R2L, and the Ipsweep, nmap, portsweep, satan belong to the probe. The simulation results show that the entropy based classification algorithm gives high detection rate and accuracy for normal instances over the J48 and Naïve Bayes classifiers.

Cite

CITATION STYLE

APA

Gautam, S. K., & Om, H. (2017). Comparative analysis of classification techniques in network based intrusion detection systems. In Advances in Intelligent Systems and Computing (Vol. 458, pp. 591–601). Springer Verlag. https://doi.org/10.1007/978-981-10-2035-3_60

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free