SlideShare a Scribd company logo
1 of 4
Download to read offline
IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 5, 2013 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 1056
Abstract-- In this paper, we present an efficient intrusion
detection technique. The intrusion detection plays an
important role in network security. However, many current
intrusion detection systems (IDSs) are signature based
systems. The signature based IDS also known as misuse
detection looks for a specific signature to match, signaling
an intrusion. Provided with the signatures or patterns, they
can detect many or all known attack patterns, but they are of
little use for as yet unknown attacks. The rate of false
positives is close to nil but these types of systems are poor at
detecting new attacks, variation of known attacks or attacks
that can be masked as normal behavior. Our proposed
solution, overcomes most of the limitations of the existing
methods. The field of intrusion detection has received
increasing attention in recent years. One reason is the
explosive growth of the internet and the large number of
networked systems that exist in all types of organizations.
Intrusion detection techniques using data mining have
attracted more and more interests in recent years. As an
important application area of data mining, they aim to
meliorate the great burden of analyzing huge volumes of
audit data and realizing performance optimization of
detection rules. The objective of this dissertation is to try out
the intrusion detection on large dataset by classification
algorithms binary class support vector machine and
improved its learning time and detection rate in the field of
Network based IDS.
Keywords: IDS, classification, KDD Data Set
I. INTRODUCTION
Following are some basic concepts on which this paper is
based.
A. Types of Intrusion Detection System
Current IDSs fall into two categories:
1 Network-based Intrusion Detection System(NIDSs)
2 Host-based Intrusion Detection System (HIDSs).
These systems can be classified based on which events they
monitor, how they collect information and how they reduce
from the information that an intrusion has occurred. IDSs
that scrutinize data circulating on the network are called
Network IDSs (NIDSs), while IDSs that reside on the host
and collect logs of operating system- related events are
called Host IDSs (HIDSs). IDSs may also vary according to
the technique by which they detect intrusions.
1) Network Based IDS
Because they only scrutinize network traffic [1], NIDS do
not benefit from running on the host. As a result, they are
often run on dedicated machines that observe the network
flows, sometimes in conjunction with a firewall. In this case,
they are not affected by security vulnerabilities on the
machines they are monitoring. Nevertheless, only a limited
number of information can be inferred from that gathered on
the network link. Besides, widespread adoption of end-to-
end encryption further limits the amount of information that
can be gathered at the network interface.
Another major shortcoming of NIDS is that they
are oblivious to local root attacks. An authorized user of the
system that attempts to gain additional privileges will not be
deleted if attack is performed locally. An authorized user of
the system may be able to set up an encrypted channel when
accessing the machine remotely.
2) Host Based IDS
HIDS have an ideal vantage point [1]. Because an HIDS
runs on the machine it monitors, it can theoretically observe
and log any event occurring on the machine. However, the
complexity of current operating system often makes it
difficult, if not impossible to accurately monitor certain
events. There are certain difficulties faced by security tools
that rely on system calls interposition to monitor a host. In
addition to shortcomings resulting from an incorrect or
incomplete understanding of the operating system, race
conditions in the operating system make the implementation
of such tools delicate. HIDSs are also confirmed with
difficulties arrived from arising from potential tampering by
the attacker. A secure logging mechanism is necessary to
prevent logs from being erased if the attacker compromises
with the machine. Even if such a mechanism is available, an
attacker obtaining super user privilege on the host can
disable the HIDS. If the HIDS is a user process, an attacker
can simply terminate the process. If it is embedded in the
kernel, the attacker can modify the kernel by loading a
kernel module or by writing directly in the kernel memory.
This means that an HIDS can only be trusted
Fig.1: Traditional IDS framework
New Fuzzy Logic Based Intrusion Detection System
Nitin Namdev1
Prof. Ravindra Kumar Gupta2
Dr. Shailendra Singh3
1
M.Tech, Computer Science and Engineering
1, 2, 3
Department of Computer Science and Engineering
1, 2, 3
SSSIST, Sehore, India
New Fuzzy Logic Based Intrusion Detection System
(IJSRD/Vol. 1/Issue 5/2013/0002)
All rights reserved by www.ijsrd.com 1057
B. Decision trees: -
The well-known machine learning techniques, a decision
tree is composed of three basic elements:
1. A decision node specifying a test attributes.
2. An edge or a branch corresponding to the one of the
possible attribute values which means one of the test
attribute outcomes.
3. A leaf which is also named an answer node contains the
class to which the object belongs.
In decision trees, two major phases should be ensured:
1. Building the tree: Based on a given training set, a
decision tree is built. It consists of selecting for each
decision node the ‗Appropriate ‘test attributes and also to
define the class labeling each leaf.
2. Classification: In order to classify a new instance, we start
by the root of the decision tree, then we test the attribute
specified by this node. The result of this test allows moving
down the tree branch relative to the attribute value of the
given instance. This process will be repeated until a leaf is
encountered. The instance is then being classified in the
same class as the one characterizing the reached leaf.
Decision trees have also been used for intrusion detection
[3]. The decision trees select the best features for each
decision node during the construction of the tree based on
some well-defined criteria. One such criterion is to use the
information gain ratio. [2]
II. PROPOSED ALGORITHM
Classification is a form of data analysis that extracts models
describing important data classes. These models also called
as classifiers are used to predict categorical (discrete,
unordered) class labels. This analysis can help us for better
understanding of large data. Classification has numerous
applications, including fraud detection, target marketing,
performance prediction, manufacturing, credit risk and
medical diagnosis [4].Data Classification is a two-step
process. They are: Learning Step and Classification Step
A. Learning Step:
In this step classification model is constructed. A classifier
is built describing a predetermined set of data classes or
concepts. In learning step or training phase, where
classification algorithm builds the classifier by analyzing or
“learning from” a training set made up of database tuples
and their associated class labels.
This step is also known as supervised learning as the class
label of each training tuple is provided. This learning of the
classifier is “supervised” by telling to which class each
training tuple belongs. In unsupervised learning or
clustering, the class label of each training tuple is not
known, and the number or set of classes to be learned may
not be known in advance.[4,5]
B. Classification Step:
In this step, the model is used to predict class labels for
given data and it is used for classification. First, the
predictive accuracy of the classifier is estimated. To
measure the classifier accuracy, if we use the training set it
would be optimistic, because the classifier tends to over fit
the data i.e., during learning it may incorporate some
particular anomalies of the training data that are not present
in the general data set. Therefore, a test set is used, made up
of the test tuples and their associated class labels., They are
independent of the training tuples, from which the classifier
cannot be constructed. The accuracy of a classifier on a
given test set is the percentage of test tuples that are
correctly classified by the classifier. The associated class
label of each test tuple is compared with the learned
classifies class prediction for the tuple. If the accuracy of the
model or classifier is considered acceptable, the model can
be used to classify future data tuples or objects for which the
class label is not known [4, 6].
C. Decision Tree Induction
A decision tree is a flow-chart-like tree structure, where
each internal node denotes a test on an attribute, each branch
represents an outcome of the test, and leaf nodes represent
classes or class distributions. The topmost node in a tree is
the root node.
Given a tuple K, for which the associated class label is
unknown, the attribute values of the tuple are tested against
the decision tree. A path is traced from the root to a leaf
node, which holds the class predicate for that tuple. Decision
trees are easily converted to classification rules. The
construction of decision does not require any domain
knowledge or parameter setting. It can handle high
dimension data. The learning and classification steps are
simple and fast. It has good accuracy. Decision tree
Induction algorithm can be used in many applications like
medicine, manufacturing and production etc.
III. PROPOSED METHOD
A. INPUT:
1. A TRAINING DATA SET WITH CLASS
LABELS
2. LIST OF ATTRIBUTES
3. FEATURE SELECTION CRITERIA. IT IS USED
FOR SPLITTING
B. OUTPUT:
A FUZZY DECISION TREEPROCEDURE:
STEP 1: IF ALL THE TUPLES OF DATASET
CONTAINS YES THEN CREATE A YES
NODE AND STOP
ELSE IF ALL THE TUPLES OF DATASET
CONTAINS NO THEN CREATE A NO
NODE AND STOP
ELSE SELECT A FEATURE AND CREATE
A DECISION NODE
STEP 2: SPLIT THE DATA SET D INTO SMALLER
FUZZY SUBSETS D1, D2,…… DN
ACCORDING TO STEP 1 CRITERIA
STEP 3: APPLY THE ALGORITHM RECURSIVELY
ON EACH DATA SET D1, D2… DN
C. ATTRIBUTE SELECTION:
Our proposed methodology uses greedy approach to select
the best attribute. To do so the information gain is used. The
New Fuzzy Logic Based Intrusion Detection System
(IJSRD/Vol. 1/Issue 5/2013/0002)
All rights reserved by www.ijsrd.com 1058
attribute with highest information gain is selected. Entropy
measures the amount of information in an attribute[5].Given
a collection D of c outcomes
Entropy (D) = D [-p (J) log2 p(J)]
Where; p (J) is the proportion of D belonging to class J. D
is over c. Log2 is log base 2. Here; D is not an attribute but
the entire sample set.
If the Entropy is 0 then all members of D belong to the same
class i.e., the data is perfectly classified. If the Entropy is 1
then all members of D are totally random. The range of
entropy is between0 to 1.
Gain (D, A) is information gain of example set D on
attribute A is defined as
Gain (D, A) = Entropy (D) - S ((|Da| / |D|) *Entropy(Da))
Where: S is each value v of all possible values of attribute A
Da= subset of D for which attribute A has value a.
| Da| = number of elements in Da
|D| = number of elements in D.
1) KDD Data Set Description:
The DARPA/MIT Lincoln lab evaluation (IDEVAL) data
set has been used to test a large number of intrusion
detection systems. The data can be used to test both host
based and network based systems, and both signature and
anomaly detection systems. The 1998 network data has also
been used to develop the 1999 KDD cup machine learning
competition. The data set that we used in our experiment is
the data set for KDD 99 cup machine learning competition,
which is a subset of the 1998 DARPA intrusion detection
evaluation data set, and is processed, extracting 41 features
from the raw data of DARPA 98 data set.
For our purposes in the creation of input data for the
Proposed Algorithm, we will look at the following example
log entry.
Packets sent
Protocol
Source Port
Destination Port
2) Training Data Set:
The Training data set is as follows:
idsalert ,packets ,proto, sport, dport
no 2138 tcp 33 34
no 12 tcp 2 3
yes 230 tcp 2 120
yes 6 tcp 1 2
yes 0 tcp 1 2
yes 145 udp 148 1
no 2138 tcp 33 34
no 12 tcp 2 3
yes 230 tcp 2 120
yes 6 tcp 1 2
yes 0 tcp 1 2
yes 145 udp 148 1
no 2138 tcp 33 34
no 12 tcp 2 3
yes 230 tcp 2 120
yes 6 tcp 1 2
yes 0 tcp 1 2
yes 145 udp 148 1
no 2138 tcp 33 34
no 12 tcp 2 3
yes 230 tcp 2 120
yes 6 tcp 1 2
yes 0 tcp 1 2
yes 145 udp 148 1
Where idsalert is for IDS alert, packets is for number of
packets sent, sport is for source port, dport is for
destination port.
3) Testing Data Set:
The testing data set is as follows:
Ids alert packets proto sport dport
yes 0 tcp 1 2
yes 145 udp 148 1
no 2138 tcp 33 34
no 12 tcp 2 3
yes 230 tcp 2 120
yes 6 tcp 1 2
yes 0 tcp 1 2
yes 145 udp 148 1
no 2138 tcp 33 34
no 12 tcp 2 3
yes 230 tcp 2 120
yes 6 tcp 1 2
yes 0 tcp 1 2
yes 145 udp 148 1
no 2138 tcp 33 34
no 12 tcp 2 3
yes 230 tcp 2 120
yes 6 tcp 1 2
yes 0 tcp 1 2
yes 145 udp 148 1
no 2138 tcp 33 34
no 12 tcp 2 3
yes 230 tcp 2 120
yes 6 tcp 1 2
4) Working of proposed algorithm:
We will train our classifier with the training data set. Then
we will enter the values of a tuple from the testing data set
in to our program. Our classifier will tell that the particular
log entry is normal or malicious. It is shown below:
When we enter the tuple no 6 from training data set in to our
program as below:
New Fuzzy Logic Based Intrusion Detection System
(IJSRD/Vol. 1/Issue 5/2013/0002)
All rights reserved by www.ijsrd.com 1059
5) We get the following result:
Debug:
Time to construct decision tree = 94 ms
Target attribute = idsalert
Other attributes = packets proto sport dport
DECISION TREE
dport->
3=no
2=yes
1=yes
120=yes
34=no
IDS Alert: yes
Dos attack/Probe
BUILD SUCCESSFUL (total time: 9 seconds)
D. Advantages of Proposed Method:
1 False Positives: A false positive occurs when the
outcome is incorrectly predicted as yes when it is
actually no.
False Negatives: A false negative occurs when the
outcome is incorrectly predicted as no when it is
actually yes.
Success Rate = (TP + TN)/(TP + TN + FP + FN)
We tested our program for the whole testing data
set the success rate is 99.68%.
2 Also our method is more suitable for novelty attack
detection. One can check it by using the
combination of 2-3 tuples from testing data set.
Even then our algorithm is providing the correct
output.
IV. CONCLUSION
Achievements are as follows:
1 Reduced model redundancy by using feature
selection algorithm without affecting performance.
2 Success rate is higher
3 Good for novelty attack detection
REFERENCES
[1] Litty Lionel, “Hypervisor-based Intrusion Detectio”,
Master of Science Graduate department of computer
Science University of Torronto, 2005.
[2] http://www.mendeley.com/research/naive-bayes-vs-
decisiontrees-in-intrusion-detection-systems/#page-1
[3] Srinivas Mukkamalaa, Andrew H. Sunga and Ajith
Abrahamb Intrusion detection using an ensemble of
intelligent paradigms‖;www.elsevier.com/locate/jnca,
January 2004
[4] “Data Mining Concepts and Techniques” byJiawei Han
and Micheline Kamber from Morgan Kaufman
Publications
[5] Adriaan; “Introduction to Data Mining”,Addison
Wesley Publication
[6] Adriaan; “Introduction to Data Mining”,Addison
Wesley Publication
.

More Related Content

What's hot

ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...
ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...
ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...IJNSA Journal
 
NSL KDD Cup 99 dataset Anomaly Detection using Machine Learning Technique
NSL KDD Cup 99 dataset Anomaly Detection using Machine Learning Technique NSL KDD Cup 99 dataset Anomaly Detection using Machine Learning Technique
NSL KDD Cup 99 dataset Anomaly Detection using Machine Learning Technique Sujeet Suryawanshi
 
Intrusion Detection System Based on K-Star Classifier and Feature Set Reduction
Intrusion Detection System Based on K-Star Classifier and Feature Set ReductionIntrusion Detection System Based on K-Star Classifier and Feature Set Reduction
Intrusion Detection System Based on K-Star Classifier and Feature Set ReductionIOSR Journals
 
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET -  	  A Secure Approach for Intruder Detection using BacktrackingIRJET -  	  A Secure Approach for Intruder Detection using Backtracking
IRJET - A Secure Approach for Intruder Detection using BacktrackingIRJET Journal
 
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...IJCSIS Research Publications
 
Data Mining Techniques for Providing Network Security through Intrusion Detec...
Data Mining Techniques for Providing Network Security through Intrusion Detec...Data Mining Techniques for Providing Network Security through Intrusion Detec...
Data Mining Techniques for Providing Network Security through Intrusion Detec...IJAAS Team
 
Comparison of Data Mining Techniques used in Anomaly Based IDS
Comparison of Data Mining Techniques used in Anomaly Based IDS  Comparison of Data Mining Techniques used in Anomaly Based IDS
Comparison of Data Mining Techniques used in Anomaly Based IDS IRJET Journal
 
Network Intrusion Detection System Based on Modified Random Forest Classifier...
Network Intrusion Detection System Based on Modified Random Forest Classifier...Network Intrusion Detection System Based on Modified Random Forest Classifier...
Network Intrusion Detection System Based on Modified Random Forest Classifier...IRJET Journal
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Classification Rule Discovery Using Ant-Miner Algorithm: An Application Of N...
Classification Rule Discovery Using Ant-Miner Algorithm: An  Application Of N...Classification Rule Discovery Using Ant-Miner Algorithm: An  Application Of N...
Classification Rule Discovery Using Ant-Miner Algorithm: An Application Of N...IJMER
 
Benchmarks for Evaluating Anomaly Based Intrusion Detection Solutions
Benchmarks for Evaluating Anomaly Based Intrusion Detection SolutionsBenchmarks for Evaluating Anomaly Based Intrusion Detection Solutions
Benchmarks for Evaluating Anomaly Based Intrusion Detection SolutionsIJNSA Journal
 
A combined approach to search for evasion techniques in network intrusion det...
A combined approach to search for evasion techniques in network intrusion det...A combined approach to search for evasion techniques in network intrusion det...
A combined approach to search for evasion techniques in network intrusion det...eSAT Journals
 
False positive reduction by combining svm and knn algo
False positive reduction by combining svm and knn algoFalse positive reduction by combining svm and knn algo
False positive reduction by combining svm and knn algoeSAT Journals
 
Multi Stage Filter Using Enhanced Adaboost for Network Intrusion Detection
Multi Stage Filter Using Enhanced Adaboost for Network Intrusion DetectionMulti Stage Filter Using Enhanced Adaboost for Network Intrusion Detection
Multi Stage Filter Using Enhanced Adaboost for Network Intrusion DetectionIJNSA Journal
 
IRJET- An Extensive Study of Sentiment Analysis Techniques and its Progressio...
IRJET- An Extensive Study of Sentiment Analysis Techniques and its Progressio...IRJET- An Extensive Study of Sentiment Analysis Techniques and its Progressio...
IRJET- An Extensive Study of Sentiment Analysis Techniques and its Progressio...IRJET Journal
 
Managing Intrusion Detection Alerts Using Support Vector Machines
Managing Intrusion Detection Alerts Using Support Vector MachinesManaging Intrusion Detection Alerts Using Support Vector Machines
Managing Intrusion Detection Alerts Using Support Vector MachinesCSCJournals
 

What's hot (16)

ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...
ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...
ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...
 
NSL KDD Cup 99 dataset Anomaly Detection using Machine Learning Technique
NSL KDD Cup 99 dataset Anomaly Detection using Machine Learning Technique NSL KDD Cup 99 dataset Anomaly Detection using Machine Learning Technique
NSL KDD Cup 99 dataset Anomaly Detection using Machine Learning Technique
 
Intrusion Detection System Based on K-Star Classifier and Feature Set Reduction
Intrusion Detection System Based on K-Star Classifier and Feature Set ReductionIntrusion Detection System Based on K-Star Classifier and Feature Set Reduction
Intrusion Detection System Based on K-Star Classifier and Feature Set Reduction
 
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET -  	  A Secure Approach for Intruder Detection using BacktrackingIRJET -  	  A Secure Approach for Intruder Detection using Backtracking
IRJET - A Secure Approach for Intruder Detection using Backtracking
 
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
 
Data Mining Techniques for Providing Network Security through Intrusion Detec...
Data Mining Techniques for Providing Network Security through Intrusion Detec...Data Mining Techniques for Providing Network Security through Intrusion Detec...
Data Mining Techniques for Providing Network Security through Intrusion Detec...
 
Comparison of Data Mining Techniques used in Anomaly Based IDS
Comparison of Data Mining Techniques used in Anomaly Based IDS  Comparison of Data Mining Techniques used in Anomaly Based IDS
Comparison of Data Mining Techniques used in Anomaly Based IDS
 
Network Intrusion Detection System Based on Modified Random Forest Classifier...
Network Intrusion Detection System Based on Modified Random Forest Classifier...Network Intrusion Detection System Based on Modified Random Forest Classifier...
Network Intrusion Detection System Based on Modified Random Forest Classifier...
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Classification Rule Discovery Using Ant-Miner Algorithm: An Application Of N...
Classification Rule Discovery Using Ant-Miner Algorithm: An  Application Of N...Classification Rule Discovery Using Ant-Miner Algorithm: An  Application Of N...
Classification Rule Discovery Using Ant-Miner Algorithm: An Application Of N...
 
Benchmarks for Evaluating Anomaly Based Intrusion Detection Solutions
Benchmarks for Evaluating Anomaly Based Intrusion Detection SolutionsBenchmarks for Evaluating Anomaly Based Intrusion Detection Solutions
Benchmarks for Evaluating Anomaly Based Intrusion Detection Solutions
 
A combined approach to search for evasion techniques in network intrusion det...
A combined approach to search for evasion techniques in network intrusion det...A combined approach to search for evasion techniques in network intrusion det...
A combined approach to search for evasion techniques in network intrusion det...
 
False positive reduction by combining svm and knn algo
False positive reduction by combining svm and knn algoFalse positive reduction by combining svm and knn algo
False positive reduction by combining svm and knn algo
 
Multi Stage Filter Using Enhanced Adaboost for Network Intrusion Detection
Multi Stage Filter Using Enhanced Adaboost for Network Intrusion DetectionMulti Stage Filter Using Enhanced Adaboost for Network Intrusion Detection
Multi Stage Filter Using Enhanced Adaboost for Network Intrusion Detection
 
IRJET- An Extensive Study of Sentiment Analysis Techniques and its Progressio...
IRJET- An Extensive Study of Sentiment Analysis Techniques and its Progressio...IRJET- An Extensive Study of Sentiment Analysis Techniques and its Progressio...
IRJET- An Extensive Study of Sentiment Analysis Techniques and its Progressio...
 
Managing Intrusion Detection Alerts Using Support Vector Machines
Managing Intrusion Detection Alerts Using Support Vector MachinesManaging Intrusion Detection Alerts Using Support Vector Machines
Managing Intrusion Detection Alerts Using Support Vector Machines
 

Viewers also liked

Intrusion detection in MANETS
Intrusion detection in MANETSIntrusion detection in MANETS
Intrusion detection in MANETSPooja Kundu
 
Intrusion Detection Presentation
Intrusion Detection PresentationIntrusion Detection Presentation
Intrusion Detection PresentationMustafash79
 
Security in manet via different intrusion detection techniques
Security in manet via different intrusion detection techniquesSecurity in manet via different intrusion detection techniques
Security in manet via different intrusion detection techniquesIAEME Publication
 
Issues in knowledge representation
Issues in knowledge representationIssues in knowledge representation
Issues in knowledge representationSravanthi Emani
 
Artificial Intelligence
Artificial Intelligence Artificial Intelligence
Artificial Intelligence Muhammad Ahad
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemAkhil Kumar
 
Knowledge Representation in Artificial intelligence
Knowledge Representation in Artificial intelligence Knowledge Representation in Artificial intelligence
Knowledge Representation in Artificial intelligence Yasir Khan
 
Knowledge representation in AI
Knowledge representation in AIKnowledge representation in AI
Knowledge representation in AIVishal Singh
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system pptSheetal Verma
 
Security issues in manet
Security issues in manetSecurity issues in manet
Security issues in manetflowerjaan
 
Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)david rom
 

Viewers also liked (12)

Intrusion detection in MANETS
Intrusion detection in MANETSIntrusion detection in MANETS
Intrusion detection in MANETS
 
Black Hole Attack Detection using Fuzzy Logic
Black Hole Attack Detection using Fuzzy LogicBlack Hole Attack Detection using Fuzzy Logic
Black Hole Attack Detection using Fuzzy Logic
 
Intrusion Detection Presentation
Intrusion Detection PresentationIntrusion Detection Presentation
Intrusion Detection Presentation
 
Security in manet via different intrusion detection techniques
Security in manet via different intrusion detection techniquesSecurity in manet via different intrusion detection techniques
Security in manet via different intrusion detection techniques
 
Issues in knowledge representation
Issues in knowledge representationIssues in knowledge representation
Issues in knowledge representation
 
Artificial Intelligence
Artificial Intelligence Artificial Intelligence
Artificial Intelligence
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Knowledge Representation in Artificial intelligence
Knowledge Representation in Artificial intelligence Knowledge Representation in Artificial intelligence
Knowledge Representation in Artificial intelligence
 
Knowledge representation in AI
Knowledge representation in AIKnowledge representation in AI
Knowledge representation in AI
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Security issues in manet
Security issues in manetSecurity issues in manet
Security issues in manet
 
Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)
 

Similar to New Fuzzy Logic Based Intrusion Detection System

V1_I1_2012_Paper3.docx
V1_I1_2012_Paper3.docxV1_I1_2012_Paper3.docx
V1_I1_2012_Paper3.docxpraveena06
 
A Survey on Various Data Mining Technique in Intrusion Detection System
A Survey on Various Data Mining Technique in Intrusion Detection SystemA Survey on Various Data Mining Technique in Intrusion Detection System
A Survey on Various Data Mining Technique in Intrusion Detection SystemIOSRjournaljce
 
Machine learning in network security using knime analytics
Machine learning in network security using knime analyticsMachine learning in network security using knime analytics
Machine learning in network security using knime analyticsIJNSA Journal
 
Articles - International Journal of Network Security & Its Applications (IJNSA)
Articles - International Journal of Network Security & Its Applications (IJNSA)Articles - International Journal of Network Security & Its Applications (IJNSA)
Articles - International Journal of Network Security & Its Applications (IJNSA)IJNSA Journal
 
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICSMACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICSIJNSA Journal
 
The Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational DatabasesThe Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational DatabasesIJRES Journal
 
A Survey on Different Machine Learning Algorithms and Weak Classifiers Based ...
A Survey on Different Machine Learning Algorithms and Weak Classifiers Based ...A Survey on Different Machine Learning Algorithms and Weak Classifiers Based ...
A Survey on Different Machine Learning Algorithms and Weak Classifiers Based ...gerogepatton
 
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...ijtsrd
 
A PHASED APPROACH TO INTRUSION DETECTION IN NETWORK
A PHASED APPROACH TO INTRUSION DETECTION IN NETWORKA PHASED APPROACH TO INTRUSION DETECTION IN NETWORK
A PHASED APPROACH TO INTRUSION DETECTION IN NETWORKIRJET Journal
 
A Survey of Security of Multimodal Biometric Systems
A Survey of Security of Multimodal Biometric SystemsA Survey of Security of Multimodal Biometric Systems
A Survey of Security of Multimodal Biometric SystemsIJERA Editor
 
New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...
New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...
New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...ijceronline
 
New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...
New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...
New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...ijceronline
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Anomaly detection by using CFS subset and neural network with WEKA tools
Anomaly detection by using CFS subset and neural network with WEKA tools Anomaly detection by using CFS subset and neural network with WEKA tools
Anomaly detection by using CFS subset and neural network with WEKA tools Drjabez
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...ijcseit
 
SURVEY OF NETWORK ANOMALY DETECTION USING MARKOV CHAIN
SURVEY OF NETWORK ANOMALY DETECTION USING MARKOV CHAINSURVEY OF NETWORK ANOMALY DETECTION USING MARKOV CHAIN
SURVEY OF NETWORK ANOMALY DETECTION USING MARKOV CHAINijcseit
 
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...IJCSIS Research Publications
 
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMSAN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMSieijjournal
 
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMSAN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMSieijjournal1
 

Similar to New Fuzzy Logic Based Intrusion Detection System (20)

V1_I1_2012_Paper3.docx
V1_I1_2012_Paper3.docxV1_I1_2012_Paper3.docx
V1_I1_2012_Paper3.docx
 
A Survey on Various Data Mining Technique in Intrusion Detection System
A Survey on Various Data Mining Technique in Intrusion Detection SystemA Survey on Various Data Mining Technique in Intrusion Detection System
A Survey on Various Data Mining Technique in Intrusion Detection System
 
Machine learning in network security using knime analytics
Machine learning in network security using knime analyticsMachine learning in network security using knime analytics
Machine learning in network security using knime analytics
 
Articles - International Journal of Network Security & Its Applications (IJNSA)
Articles - International Journal of Network Security & Its Applications (IJNSA)Articles - International Journal of Network Security & Its Applications (IJNSA)
Articles - International Journal of Network Security & Its Applications (IJNSA)
 
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICSMACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
 
The Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational DatabasesThe Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational Databases
 
A Survey on Different Machine Learning Algorithms and Weak Classifiers Based ...
A Survey on Different Machine Learning Algorithms and Weak Classifiers Based ...A Survey on Different Machine Learning Algorithms and Weak Classifiers Based ...
A Survey on Different Machine Learning Algorithms and Weak Classifiers Based ...
 
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
 
A PHASED APPROACH TO INTRUSION DETECTION IN NETWORK
A PHASED APPROACH TO INTRUSION DETECTION IN NETWORKA PHASED APPROACH TO INTRUSION DETECTION IN NETWORK
A PHASED APPROACH TO INTRUSION DETECTION IN NETWORK
 
A Survey of Security of Multimodal Biometric Systems
A Survey of Security of Multimodal Biometric SystemsA Survey of Security of Multimodal Biometric Systems
A Survey of Security of Multimodal Biometric Systems
 
New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...
New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...
New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...
 
New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...
New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...
New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Anomaly detection by using CFS subset and neural network with WEKA tools
Anomaly detection by using CFS subset and neural network with WEKA tools Anomaly detection by using CFS subset and neural network with WEKA tools
Anomaly detection by using CFS subset and neural network with WEKA tools
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
 
SURVEY OF NETWORK ANOMALY DETECTION USING MARKOV CHAIN
SURVEY OF NETWORK ANOMALY DETECTION USING MARKOV CHAINSURVEY OF NETWORK ANOMALY DETECTION USING MARKOV CHAIN
SURVEY OF NETWORK ANOMALY DETECTION USING MARKOV CHAIN
 
Ijcet 06 07_002
Ijcet 06 07_002Ijcet 06 07_002
Ijcet 06 07_002
 
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
 
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMSAN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
 
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMSAN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
 

More from ijsrd.com

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Gridijsrd.com
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Lifeijsrd.com
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTijsrd.com
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...ijsrd.com
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Lifeijsrd.com
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learningijsrd.com
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation Systemijsrd.com
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...ijsrd.com
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigeratorijsrd.com
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...ijsrd.com
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingijsrd.com
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMijsrd.com
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Trackingijsrd.com
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...ijsrd.com
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparatorsijsrd.com
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...ijsrd.com
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
 

More from ijsrd.com (20)

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
 

Recently uploaded

(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 

Recently uploaded (20)

(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 

New Fuzzy Logic Based Intrusion Detection System

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 5, 2013 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 1056 Abstract-- In this paper, we present an efficient intrusion detection technique. The intrusion detection plays an important role in network security. However, many current intrusion detection systems (IDSs) are signature based systems. The signature based IDS also known as misuse detection looks for a specific signature to match, signaling an intrusion. Provided with the signatures or patterns, they can detect many or all known attack patterns, but they are of little use for as yet unknown attacks. The rate of false positives is close to nil but these types of systems are poor at detecting new attacks, variation of known attacks or attacks that can be masked as normal behavior. Our proposed solution, overcomes most of the limitations of the existing methods. The field of intrusion detection has received increasing attention in recent years. One reason is the explosive growth of the internet and the large number of networked systems that exist in all types of organizations. Intrusion detection techniques using data mining have attracted more and more interests in recent years. As an important application area of data mining, they aim to meliorate the great burden of analyzing huge volumes of audit data and realizing performance optimization of detection rules. The objective of this dissertation is to try out the intrusion detection on large dataset by classification algorithms binary class support vector machine and improved its learning time and detection rate in the field of Network based IDS. Keywords: IDS, classification, KDD Data Set I. INTRODUCTION Following are some basic concepts on which this paper is based. A. Types of Intrusion Detection System Current IDSs fall into two categories: 1 Network-based Intrusion Detection System(NIDSs) 2 Host-based Intrusion Detection System (HIDSs). These systems can be classified based on which events they monitor, how they collect information and how they reduce from the information that an intrusion has occurred. IDSs that scrutinize data circulating on the network are called Network IDSs (NIDSs), while IDSs that reside on the host and collect logs of operating system- related events are called Host IDSs (HIDSs). IDSs may also vary according to the technique by which they detect intrusions. 1) Network Based IDS Because they only scrutinize network traffic [1], NIDS do not benefit from running on the host. As a result, they are often run on dedicated machines that observe the network flows, sometimes in conjunction with a firewall. In this case, they are not affected by security vulnerabilities on the machines they are monitoring. Nevertheless, only a limited number of information can be inferred from that gathered on the network link. Besides, widespread adoption of end-to- end encryption further limits the amount of information that can be gathered at the network interface. Another major shortcoming of NIDS is that they are oblivious to local root attacks. An authorized user of the system that attempts to gain additional privileges will not be deleted if attack is performed locally. An authorized user of the system may be able to set up an encrypted channel when accessing the machine remotely. 2) Host Based IDS HIDS have an ideal vantage point [1]. Because an HIDS runs on the machine it monitors, it can theoretically observe and log any event occurring on the machine. However, the complexity of current operating system often makes it difficult, if not impossible to accurately monitor certain events. There are certain difficulties faced by security tools that rely on system calls interposition to monitor a host. In addition to shortcomings resulting from an incorrect or incomplete understanding of the operating system, race conditions in the operating system make the implementation of such tools delicate. HIDSs are also confirmed with difficulties arrived from arising from potential tampering by the attacker. A secure logging mechanism is necessary to prevent logs from being erased if the attacker compromises with the machine. Even if such a mechanism is available, an attacker obtaining super user privilege on the host can disable the HIDS. If the HIDS is a user process, an attacker can simply terminate the process. If it is embedded in the kernel, the attacker can modify the kernel by loading a kernel module or by writing directly in the kernel memory. This means that an HIDS can only be trusted Fig.1: Traditional IDS framework New Fuzzy Logic Based Intrusion Detection System Nitin Namdev1 Prof. Ravindra Kumar Gupta2 Dr. Shailendra Singh3 1 M.Tech, Computer Science and Engineering 1, 2, 3 Department of Computer Science and Engineering 1, 2, 3 SSSIST, Sehore, India
  • 2. New Fuzzy Logic Based Intrusion Detection System (IJSRD/Vol. 1/Issue 5/2013/0002) All rights reserved by www.ijsrd.com 1057 B. Decision trees: - The well-known machine learning techniques, a decision tree is composed of three basic elements: 1. A decision node specifying a test attributes. 2. An edge or a branch corresponding to the one of the possible attribute values which means one of the test attribute outcomes. 3. A leaf which is also named an answer node contains the class to which the object belongs. In decision trees, two major phases should be ensured: 1. Building the tree: Based on a given training set, a decision tree is built. It consists of selecting for each decision node the ‗Appropriate ‘test attributes and also to define the class labeling each leaf. 2. Classification: In order to classify a new instance, we start by the root of the decision tree, then we test the attribute specified by this node. The result of this test allows moving down the tree branch relative to the attribute value of the given instance. This process will be repeated until a leaf is encountered. The instance is then being classified in the same class as the one characterizing the reached leaf. Decision trees have also been used for intrusion detection [3]. The decision trees select the best features for each decision node during the construction of the tree based on some well-defined criteria. One such criterion is to use the information gain ratio. [2] II. PROPOSED ALGORITHM Classification is a form of data analysis that extracts models describing important data classes. These models also called as classifiers are used to predict categorical (discrete, unordered) class labels. This analysis can help us for better understanding of large data. Classification has numerous applications, including fraud detection, target marketing, performance prediction, manufacturing, credit risk and medical diagnosis [4].Data Classification is a two-step process. They are: Learning Step and Classification Step A. Learning Step: In this step classification model is constructed. A classifier is built describing a predetermined set of data classes or concepts. In learning step or training phase, where classification algorithm builds the classifier by analyzing or “learning from” a training set made up of database tuples and their associated class labels. This step is also known as supervised learning as the class label of each training tuple is provided. This learning of the classifier is “supervised” by telling to which class each training tuple belongs. In unsupervised learning or clustering, the class label of each training tuple is not known, and the number or set of classes to be learned may not be known in advance.[4,5] B. Classification Step: In this step, the model is used to predict class labels for given data and it is used for classification. First, the predictive accuracy of the classifier is estimated. To measure the classifier accuracy, if we use the training set it would be optimistic, because the classifier tends to over fit the data i.e., during learning it may incorporate some particular anomalies of the training data that are not present in the general data set. Therefore, a test set is used, made up of the test tuples and their associated class labels., They are independent of the training tuples, from which the classifier cannot be constructed. The accuracy of a classifier on a given test set is the percentage of test tuples that are correctly classified by the classifier. The associated class label of each test tuple is compared with the learned classifies class prediction for the tuple. If the accuracy of the model or classifier is considered acceptable, the model can be used to classify future data tuples or objects for which the class label is not known [4, 6]. C. Decision Tree Induction A decision tree is a flow-chart-like tree structure, where each internal node denotes a test on an attribute, each branch represents an outcome of the test, and leaf nodes represent classes or class distributions. The topmost node in a tree is the root node. Given a tuple K, for which the associated class label is unknown, the attribute values of the tuple are tested against the decision tree. A path is traced from the root to a leaf node, which holds the class predicate for that tuple. Decision trees are easily converted to classification rules. The construction of decision does not require any domain knowledge or parameter setting. It can handle high dimension data. The learning and classification steps are simple and fast. It has good accuracy. Decision tree Induction algorithm can be used in many applications like medicine, manufacturing and production etc. III. PROPOSED METHOD A. INPUT: 1. A TRAINING DATA SET WITH CLASS LABELS 2. LIST OF ATTRIBUTES 3. FEATURE SELECTION CRITERIA. IT IS USED FOR SPLITTING B. OUTPUT: A FUZZY DECISION TREEPROCEDURE: STEP 1: IF ALL THE TUPLES OF DATASET CONTAINS YES THEN CREATE A YES NODE AND STOP ELSE IF ALL THE TUPLES OF DATASET CONTAINS NO THEN CREATE A NO NODE AND STOP ELSE SELECT A FEATURE AND CREATE A DECISION NODE STEP 2: SPLIT THE DATA SET D INTO SMALLER FUZZY SUBSETS D1, D2,…… DN ACCORDING TO STEP 1 CRITERIA STEP 3: APPLY THE ALGORITHM RECURSIVELY ON EACH DATA SET D1, D2… DN C. ATTRIBUTE SELECTION: Our proposed methodology uses greedy approach to select the best attribute. To do so the information gain is used. The
  • 3. New Fuzzy Logic Based Intrusion Detection System (IJSRD/Vol. 1/Issue 5/2013/0002) All rights reserved by www.ijsrd.com 1058 attribute with highest information gain is selected. Entropy measures the amount of information in an attribute[5].Given a collection D of c outcomes Entropy (D) = D [-p (J) log2 p(J)] Where; p (J) is the proportion of D belonging to class J. D is over c. Log2 is log base 2. Here; D is not an attribute but the entire sample set. If the Entropy is 0 then all members of D belong to the same class i.e., the data is perfectly classified. If the Entropy is 1 then all members of D are totally random. The range of entropy is between0 to 1. Gain (D, A) is information gain of example set D on attribute A is defined as Gain (D, A) = Entropy (D) - S ((|Da| / |D|) *Entropy(Da)) Where: S is each value v of all possible values of attribute A Da= subset of D for which attribute A has value a. | Da| = number of elements in Da |D| = number of elements in D. 1) KDD Data Set Description: The DARPA/MIT Lincoln lab evaluation (IDEVAL) data set has been used to test a large number of intrusion detection systems. The data can be used to test both host based and network based systems, and both signature and anomaly detection systems. The 1998 network data has also been used to develop the 1999 KDD cup machine learning competition. The data set that we used in our experiment is the data set for KDD 99 cup machine learning competition, which is a subset of the 1998 DARPA intrusion detection evaluation data set, and is processed, extracting 41 features from the raw data of DARPA 98 data set. For our purposes in the creation of input data for the Proposed Algorithm, we will look at the following example log entry. Packets sent Protocol Source Port Destination Port 2) Training Data Set: The Training data set is as follows: idsalert ,packets ,proto, sport, dport no 2138 tcp 33 34 no 12 tcp 2 3 yes 230 tcp 2 120 yes 6 tcp 1 2 yes 0 tcp 1 2 yes 145 udp 148 1 no 2138 tcp 33 34 no 12 tcp 2 3 yes 230 tcp 2 120 yes 6 tcp 1 2 yes 0 tcp 1 2 yes 145 udp 148 1 no 2138 tcp 33 34 no 12 tcp 2 3 yes 230 tcp 2 120 yes 6 tcp 1 2 yes 0 tcp 1 2 yes 145 udp 148 1 no 2138 tcp 33 34 no 12 tcp 2 3 yes 230 tcp 2 120 yes 6 tcp 1 2 yes 0 tcp 1 2 yes 145 udp 148 1 Where idsalert is for IDS alert, packets is for number of packets sent, sport is for source port, dport is for destination port. 3) Testing Data Set: The testing data set is as follows: Ids alert packets proto sport dport yes 0 tcp 1 2 yes 145 udp 148 1 no 2138 tcp 33 34 no 12 tcp 2 3 yes 230 tcp 2 120 yes 6 tcp 1 2 yes 0 tcp 1 2 yes 145 udp 148 1 no 2138 tcp 33 34 no 12 tcp 2 3 yes 230 tcp 2 120 yes 6 tcp 1 2 yes 0 tcp 1 2 yes 145 udp 148 1 no 2138 tcp 33 34 no 12 tcp 2 3 yes 230 tcp 2 120 yes 6 tcp 1 2 yes 0 tcp 1 2 yes 145 udp 148 1 no 2138 tcp 33 34 no 12 tcp 2 3 yes 230 tcp 2 120 yes 6 tcp 1 2 4) Working of proposed algorithm: We will train our classifier with the training data set. Then we will enter the values of a tuple from the testing data set in to our program. Our classifier will tell that the particular log entry is normal or malicious. It is shown below: When we enter the tuple no 6 from training data set in to our program as below:
  • 4. New Fuzzy Logic Based Intrusion Detection System (IJSRD/Vol. 1/Issue 5/2013/0002) All rights reserved by www.ijsrd.com 1059 5) We get the following result: Debug: Time to construct decision tree = 94 ms Target attribute = idsalert Other attributes = packets proto sport dport DECISION TREE dport-> 3=no 2=yes 1=yes 120=yes 34=no IDS Alert: yes Dos attack/Probe BUILD SUCCESSFUL (total time: 9 seconds) D. Advantages of Proposed Method: 1 False Positives: A false positive occurs when the outcome is incorrectly predicted as yes when it is actually no. False Negatives: A false negative occurs when the outcome is incorrectly predicted as no when it is actually yes. Success Rate = (TP + TN)/(TP + TN + FP + FN) We tested our program for the whole testing data set the success rate is 99.68%. 2 Also our method is more suitable for novelty attack detection. One can check it by using the combination of 2-3 tuples from testing data set. Even then our algorithm is providing the correct output. IV. CONCLUSION Achievements are as follows: 1 Reduced model redundancy by using feature selection algorithm without affecting performance. 2 Success rate is higher 3 Good for novelty attack detection REFERENCES [1] Litty Lionel, “Hypervisor-based Intrusion Detectio”, Master of Science Graduate department of computer Science University of Torronto, 2005. [2] http://www.mendeley.com/research/naive-bayes-vs- decisiontrees-in-intrusion-detection-systems/#page-1 [3] Srinivas Mukkamalaa, Andrew H. Sunga and Ajith Abrahamb Intrusion detection using an ensemble of intelligent paradigms‖;www.elsevier.com/locate/jnca, January 2004 [4] “Data Mining Concepts and Techniques” byJiawei Han and Micheline Kamber from Morgan Kaufman Publications [5] Adriaan; “Introduction to Data Mining”,Addison Wesley Publication [6] Adriaan; “Introduction to Data Mining”,Addison Wesley Publication .