2015
DOI: 10.7763/ijmlc.2015.v5.476
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive Hybrid Model for Network Intrusion Detection and Comparison among Machine Learning Algorithms

Abstract: Abstract-In this paper, we propose a novel method using ensemble learning scheme for classifying network intrusion detection from the most renowned KDD cup dataset. We have shown that reducing the dimensionality of the large dataset provides most accurate detection. Additionally, several machine learning algorithms are used to generate the accuracy metrics and analyzed further for proper comparison. Our approach found out that this algorithm outperforms all other learning techniques. Our goal is to analyze the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(3 citation statements)
references
References 28 publications
0
2
0
Order By: Relevance
“…In [15,16], an improved IDS system with the application of Snort rules to detect the network probe attacks was proposed. The authors devised a novel method to enhance the rules of snort IDS to effectively detect the network probe attacks.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In [15,16], an improved IDS system with the application of Snort rules to detect the network probe attacks was proposed. The authors devised a novel method to enhance the rules of snort IDS to effectively detect the network probe attacks.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In literature, several approaches for classifiers combination proposed. [7,8,9,10,11,12,13,14,15,16,17,18,19,20,21], [22,23,24,25,26,27,28,29,30,31]…”
Section: Hybrid and Ensemble Pattern Recognitionmentioning
confidence: 99%
“…Researches on user authentication can be divided into two types: one-time certification and sustainable certification [2]. The former can be classified into following methods: Traditional account, password authentication [3]- [5], Smart card-based authentication [6], the authentication based on biological and behavioral characteristics (e.g. fingerprint, users' habits of using the mouse [7], [8] and keyboard input [9], [10]).…”
Section: Introductionmentioning
confidence: 99%