Research Journal of Applied Sciences

Year: 2016
Volume: 11
Issue: 10
Page No. 910 - 920

An Evaluation Study on Performance Enhancement of Intrusion Detection Systems

Authors : Adil M. Salman and Safaa O. Al-mamory

References

Amrita and P. Ahmed, 2012. A study of feature selection methods in intrusion detection system: A survey. Int. J. Comput. Sci. Eng. Inf. Technol. Res., 2: 1-25.

Araar, A. and R. Bouslama, 2014. A comparative study of classification models for detection in ip networks intrusions. J. Theoretical Appl. Inf. Technol., 64: 107-114.

Araujo, N., D.R. Oliveira, A.A. Shinoda and B. Bhargava, 2010. Identifying important characteristics in the KDD99 intrusion detection dataset by feature selection using a hybrid approach. Proceedings of the IEEE 17th International Conference on Telecommunications (ICT), April 4-7, 2010, IEEE, Cuiaba, Brazil, ISBN:978-1-4244-5246-0, pp: 552-558.

Bhuyan, M.H., D.K. Bhattacharyya and J.K. Kalita, 2014. Network anomaly detection: methods, systems and tools. IEEE. Commun. Surv. Tutorials, 16: 303-336.
CrossRef  |  Direct Link  |  

Bjerkestrand, T., D. Tsaptsinos and E. Pfluegel, 2015. An evaluation of feature selection and reduction algorithms for network IDS data. Proceedings of the International Conference on Cyber Situational Awareness Data Analytics and Assessment (CyberSA), June 8-9, 2015, IEEE, London, UK., ISBN:978-0-9932-3380-7, pp: 1-2.

Chen, Y., Y. Li, X.Q. Cheng and L. Guo, 2006. Survey and taxonomy of feature selection algorithms in intrusion detection system. Proceedings of the International Conference on Information Security and Cryptology, November 29- December 1, 2006, Springer, Berlin, Germany, ISBN:978-3-540-49608-3, pp: 153-167.

Garg, T. and S.S. Khurana, 2014. Comparison of classification techniques for intrusion detection dataset using WEKA. Proceedings of the IEEE Conference on Recent Advances and Innovations in Engineering (ICRAIE), May 9-11, 2014, IEEE, Bathinda, India, ISBN:978-1-4799-4040-0, pp: 1-5.

Garg, T. and Y. Kumar, 2014. Combinational feature selection approach for network intrusion detection system. Proceedings of the 2014 International Conference on Parallel Distributed and Grid Computing (PDGC), December 11-13, 2014, IEEE, Kapurthala, India, ISBN:978-1-4799-7682-9, pp: 82-87.

Gogoi, P., M.H. Bhuyan, D.K. Bhattacharyya and J.K. Kalita, 2012. Packet and flow based network intrusion dataset. Proceedings of the International Conference on Contemporary Computing, August 6-8, 2012, Springer, Berlin, Germany, ISBN:978-3-642-32128-3, pp: 322-334.

Heady, R., G.F. Luger, A. Maccabe and M. Servilla, 1990. The architecture of a network level intrusion detection system. Department of Computer Science, College of Engineering, University of New Mexico, New Mexico. https://www.researchgate.net/profile/Mark_Servilla/publication/242637613_The_architecture_of_a_network_level_intrusion_detection_system/links/5564805a08ae06101ab

Kumar, M.S., 2016. A survey on improving classification performance using data pre processing and machine learning methods on NSL-KDD data. Int. J. Eng. Comput. Sci., 5: 16156-16161.
Direct Link  |  

Lee, W. and S. Stolfo, 1998. Data mining approaches for intrusion detection. Proceedings of the 7th USENIX Security Symposium, January 26-29, 1998, USENIX Association, Berkeley, CA., USA., pp: 79-94.

Moraglio, A., C.D. Chio, J. Togelius and R. Poli, 2008. Geometric particle swarm optimization. J. Artif. Evol. Appl., 2008: 1-14.
CrossRef  |  Direct Link  |  

Oyebode, E.O., S.G. Fashoto, O.A. Ojesanmi, O.E. Makinde and O. State, 2011. Intrusion detection system for computer network security 1. Aust. J. Basic Appl. Sci., 5: 1317-1320.

Patcha, A. and J.M. Park, 2007. An overview of anomaly detection techniques: Existing solutions and latest technological trends. Comput. Networks, 51: 3448-3470.
CrossRef  |  

Sheen, S. and R. Rajesh, 2008. Network intrusion detection using feature selection and decision tree classifier. Proceedings of the IEEE Region 10 Conference TENCON, November 19-21, 2008, Hyderabad, pp: 1-4.

Singh, H. and D. Kumar, 2015. A study on performance analysis of various feature selection techniques in intrusion detection system. Int. J., 3: 50-54.
Direct Link  |  

Stolfo, J., W. Fan, W. Lee, A. Prodromidis and P.K. Chan, 2000. Cost-based modeling and evaluation for data mining with application to fraud and intrusion detection: Results from the JAM Project by Salvatore. Computer Science Department, Columbia University, New York, USA. http://ids.cs.columbia.edu/sites/default/files/ada511232.pdf

Tavallaee, M., E. Bagheri, W. Lu and A.A. Ghorbani, 2009. A detailed analysis of the KDD CUP 99 data set. Proceedings of the 2nd IEEE Symposium on Computational Intelligence for Security and Defence Applications, July 8-10 2009, Ottawa, Canada -.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved