Intrusion Detection System (IDS) is an effective security tool that helps to prevent unauthorized access to network resources by analysing the network traffic and classifying the records as either normal or anomalous. In this paper, a new classification method using Fisher Linear Discriminant Analysis (FLDA) is proposed. The features of KDD Cup ’99 attack dataset are reduced for each class of attacks using correlation based feature selection method. Then with the reduced feature set, discriminant analysis is done for the classification of records. Comparison with other approaches reveals that our approach achieves good classification rate for R2L (Remote-to-Local) and U2R (User-to-Root) attacks
In this modern age, information technology (IT) plays a role in a number of different fields. And th...
In current day information transmitted from one place to another by using network communication tech...
Anomaly Intrusion Detection System (IDS) is a statistical based network IDS which can detect attack ...
Abstract: The KDD Cup '99 is commonly used dataset for training and testing IDS machine learnin...
The KDD Cup '99 is commonly used dataset for training and testing IDS machine learning algorithms...
Detection accuracy of Intrusion Detection System (IDS) depends on classifying network traffic based ...
The increase in the frequency of use of the internet causes the attacks on computer networks to incr...
Intrusion detection system (IDS) is a well-known and effective component of network security that pr...
The recent increase in hacks and computer network attacks around the world has intensified the need ...
The Network Intrusion Detection System (NIDS) is a useful security utility that helps to prevent una...
With the rapid growth of digital technology communications are overwhelmed by network data traffic. ...
Network intrusion detection often finds a difficulty in creating classifiers that could handle unequ...
With the evident need for accuracy in the performance of intrusion detection system, it is expedient...
Abstract: Due to continuous growth of the Internet technology, it needs to establish security mechan...
Any abnormal activity can be assumed to be anomalies intrusion. In the literature several techniques...
In this modern age, information technology (IT) plays a role in a number of different fields. And th...
In current day information transmitted from one place to another by using network communication tech...
Anomaly Intrusion Detection System (IDS) is a statistical based network IDS which can detect attack ...
Abstract: The KDD Cup '99 is commonly used dataset for training and testing IDS machine learnin...
The KDD Cup '99 is commonly used dataset for training and testing IDS machine learning algorithms...
Detection accuracy of Intrusion Detection System (IDS) depends on classifying network traffic based ...
The increase in the frequency of use of the internet causes the attacks on computer networks to incr...
Intrusion detection system (IDS) is a well-known and effective component of network security that pr...
The recent increase in hacks and computer network attacks around the world has intensified the need ...
The Network Intrusion Detection System (NIDS) is a useful security utility that helps to prevent una...
With the rapid growth of digital technology communications are overwhelmed by network data traffic. ...
Network intrusion detection often finds a difficulty in creating classifiers that could handle unequ...
With the evident need for accuracy in the performance of intrusion detection system, it is expedient...
Abstract: Due to continuous growth of the Internet technology, it needs to establish security mechan...
Any abnormal activity can be assumed to be anomalies intrusion. In the literature several techniques...
In this modern age, information technology (IT) plays a role in a number of different fields. And th...
In current day information transmitted from one place to another by using network communication tech...
Anomaly Intrusion Detection System (IDS) is a statistical based network IDS which can detect attack ...