Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 247))

Abstract

Now a day’s, Intrusion detection is a very important research area in network security. Machine learning techniques have been applied to the field of intrusion detection. In this paper, we use KDD Cup 99’ data set for taking samples. For these samples we use classification algorithms to classify the network traffic data. In this paper, we are going to compare our results with features selected using Naive Bayes, Neural Networks. We are trying to use standard measurements like detection rate, false positive, false negative, accuracy and Confusion Matrix.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Farid, D., Harbi, N., Rahman, M.Z.: Combining Naïve Bayes And Decision Tree For Adaptive Intrusion Detection. International Journal of Network Security & Its Applications (IJNSA) 2(2) (April 2010)

    Google Scholar 

  2. Akbar, S., Nageswara Rao, K., Chandulal, J.A.: Intrusion Detection SystemMethodologies Based on Data Analysis. International Journal of Computer Applications 5(2), 0975–8887 (2010)

    Google Scholar 

  3. Chandolikar, N.S., Nandavadekar, V.D.: Selection of Relevant Feature for Intrusion Attack Classification by Analyzing KDD Cup 99. MIT International Journal of Computer Science & Information Technology 2(2), 85–90 (2012) ISSN No. 2230-7621

    Google Scholar 

  4. Srinivasu, P., Avadhani, P.S.: Approaches and Data Processing Techniques for Intrusion Detection System. International Journal of Computer Science and Network Security 9(12) (December 2009)

    Google Scholar 

  5. Olusola, A.A., Oladele, A.S., Abosede, D.O.: Analysis of KDD ’99 Intrusion Detection Dataset for Selection of Relevance Features. In: Proceedings of the World Congress on Engineering and Computer Science, WCECS 2010, San Francisco, USA, October 20-22, vol. I (2010)

    Google Scholar 

  6. http://www.kdd.ics.uci.edu/databases/kddcup99/task.html

  7. Singh, S., Silakari, S.: An ensemble approach for feature selection of Cyber Attack Dataset. International Journal of Computer Science and Information Security 6(2) (2009)

    Google Scholar 

  8. Jain, A., Sharma, S., Sisodia, M.S.: Network Intrusion Detection by using Supervised and Unsupervised Machine Learning Technique- A Survey. IJCTEE 1(3) (Deceember 2011)

    Google Scholar 

  9. Vinchurkar, D.P., Reshamwala, A.: A Review of Intrusion Detection System Using Neural Network and Machine Learning Technique. IJESIT 1(2) (November 2012)

    Google Scholar 

  10. Tang, H., Cad, Z.: Machine Learning-based Intrusion Detection Algorithms. Journal of Computational Information Systems 5(6), 1825–1831 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Sravani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Sravani, K., Srinivasu, P. (2014). Comparative Study of Machine Learning Algorithm for Intrusion Detection System. In: Satapathy, S., Udgata, S., Biswal, B. (eds) Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013. Advances in Intelligent Systems and Computing, vol 247. Springer, Cham. https://doi.org/10.1007/978-3-319-02931-3_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-02931-3_23

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-02930-6

  • Online ISBN: 978-3-319-02931-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics