2014 International Conference on Electronics and Communication Systems (ICECS) 2014
DOI: 10.1109/ecs.2014.6892542
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion detection system by improved preprocessing methods and Naïve Bayes classifier using NSL-KDD 99 Dataset

Abstract: Today Network is one of the very important parts of life and a lot of essential activities are performed using network. Network security plays critical role in real life situations. This paper presents a Data Mining method in which various preprocessing methods are involved such as Normalization, Discretization and Feature selection. With the help of these methods the data is preprocessed and required features are selected. Here NaIve Bayes classifier is used in supervised learning method which classifies vari… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 32 publications
(12 citation statements)
references
References 10 publications
0
12
0
Order By: Relevance
“…Using machine learning algorithms in Intrusion Detection System (IDS) is an attracting research area for cyber security researchers around the world [5][6][7][8][9][10][11][12][13][14]. In this research, experiments were made based on classifying NSL-KDD dataset to either normal or attack.…”
Section: Experiments and Resultsmentioning
confidence: 99%
“…Using machine learning algorithms in Intrusion Detection System (IDS) is an attracting research area for cyber security researchers around the world [5][6][7][8][9][10][11][12][13][14]. In this research, experiments were made based on classifying NSL-KDD dataset to either normal or attack.…”
Section: Experiments and Resultsmentioning
confidence: 99%
“…In 2014, Deshmukh et al [22] presents a Data Mining method in which various preprocessing methods are involved such as Normalization, Discretization and Feature selection. With the help of these methods the data is preprocessed and required features are selected.…”
Section: Literature Surveymentioning
confidence: 99%
“…While most papers will try to emphasize the âAIJaccuracyâAI of their algorithm, this word could mean different things depending on the method. Some papers describe the accuracy on a small test set, or the average accuracy across many test sets and on specific attacks, and some even describe the accuracy as the percentage correct when classifying the training set itself [7,8,9,10]. Along with these issues, a singular accuracy score is not enough to determine the strength of an algorithm, particularly of this nature.…”
Section: Introductionmentioning
confidence: 99%