Skip navigation


Please use this identifier to cite or link to this item: http://localhost:8080/xmlui/handle/123456789/2826
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSane, Shirish S.-
dc.contributor.authorKalavadekar, P. N.-
dc.date.accessioned2020-12-07T10:50:35Z-
dc.date.available2020-12-07T10:50:35Z-
dc.date.issued2019-08-02-
dc.identifier.urihttp://192.168.3.232:8080/jspui/handle/123456789/2826-
dc.description.abstractIntrusion Detection Systems (IDS) are providing better solution to the current issues and thus became an important element of any security infrastructure to detect various threats so as to prevent widespread harm. The basic aim of IDS is to detect attacks and their nature and prevent damage to the computer systems. Several different approaches for intrusion detection have been reported in the literature. These approaches are broadly categorized into three approaches: I) Signature-based approach II) Anomaly based approach and III) Hybrid approach that combines signature and anomaly detection approaches. Hybrid approach has been found to be superior to either signature based or anomaly based approaches. Several different algorithms are available for hybrid approach. This paper suggests the combined approach using signature and anomaly detection techniques. The signature based is build using genetic algorithm as filter based feature selection and J48 as classifier and data mining approach is used to build anomaly based IDS. The performance of combined IDS is evaluated on well known datasets such as KDD Cup 99, UGR 16 and Kyoto 2006+ etc. The experimental results presented here are encouraging and show superiority of combined IDS to detect network anomalies with respect to time required building the model, detection rate, accuracy and false positive rate.en_US
dc.subjectAnomalyen_US
dc.subjectSignatureen_US
dc.subjectData Miningen_US
dc.subjectIntrusion Detection,en_US
dc.titleBuilding an Effective Intrusion Detection System using combined Signature and Anomaly Detection Techniquesen_US
Appears in Collections:Building an Effective Intrusion Detection System using combined Signature and Anomaly Detection Techniques

Files in This Item:
File Description SizeFormat 
Building an Effective Intrusion Detection.pdf572.08 kBUnknownView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.