INTRODUCTION
An Intrusion Detection System is a software application which monitors a network or systems for malicious activity or policy violations. A host-based intrusion detection system (HIDS) is an intrusion detection system that is capable of monitoring and analyzing the internals of a computing system as well as the network packets on its network interfaces. A HIDS analyzes the traffic to and from the specific computer on which the intrusion detection software is
installed. A host-based system also has the ability to monitor key system files and any attempt to overwrite these files.
Over the years, mankind has made great progress with technology. In today’s context the internet has been a great source of everything such as entertainment, work, classes communication and the list goes on. But there are consequences to them as our data is being compromised in the process. There is a problem of how secure our data Is and how it is being used. The traditional security system can no longer be used to detect the intrusion due to complex intrusion behavior. Data mining is the process of finding the important data from a large dataset which can be used with machine learning techniques to build an efficient model. In this project we will be using NSL KDD dataset. We will use various classifiers and compare them to analyze NSL KDD dataset and the classifier which will have
greatest accuracy will be considered the best.
Dataset Description
Various drawbacks of KDD CUP 99 which was the main cause to decrease in the
performance of various IDS [7] led to the invention of NSL KDD dataset. NSL KDD is the refined version and also called the successor of KDD CUP dataset. It consists of all the needed attributes from KDD CUP dataset. It is an open source data and can be downloaded easily [2]. The advantage of using this dataset is redundant record is removed and sufficient number of records is present for train and test data. It consists of 41 attributes which is classified under Nominal, Binary and Numeric 1.
One more attribute is added as class which is 42nd attribute. There are two types of class called Normal and Anomaly. Anomaly class can be further divided into DOS, PROBE, R2L and U2R. For experiment purpose only two classes are considered: Normal and Anomaly.
OBJECTIVE
To compare and analyze the accuracy of different algorithms for intrusion detection.
Love to see this every day !
Certainly, it has become a difficult but exciting job to have their personal brand name of poker chips. A great comprehending of each will assist you strategy your methods well as the sport progresses.
Don’t hurry with pleasure but perform the sport with simplicity using your thoughts power and intuition. But winning regularly is a lot of hard work. I understood I experienced to get myself a established.
Best movie i have ever seen !
Hi there, You have done a fantastic job. I’ll certainly digg it and personally recommend to my friends. I’m confident they’ll be benefited from this site.
continuously i used to read smaller articles that also clear their motive,
and that is also happening with this article which I am
reading here.
When I originally left a comment I appear to
have clicked on the -Notify me when new comments are added- checkbox and now whenever a comment is
added I get 4 emails with the exact same comment. Perhaps there is an easy method you are able to remove me
from that service? Thanks!
This text is invaluable. How can I find out more?
What’s up Dear, are you genuinely visiting this site on a regular
basis, if so after that you will definitely obtain pleasant experience.
Hi there, of course this article is really pleasant and I have learned lot of things from it concerning blogging.
thanks.
Quality articles is the secret to be a focus
for the users to pay a visit the web page, that’s what this website is providing.
adreamoftrains webhosting
This blog was… how do I say it? Relevant!! Finally I’ve found something that helped me.
Thanks a lot!
Hello! Someone in my Facebook group shared this website with us so I came to look it over. I’m definitely loving the information. I’m book-marking and will be tweeting this to my followers! Exceptional blog and excellent design and style.|
You have brought up a very fantastic details , thanks for the post.
That is a good tip particularly to those
new to the blogosphere. Short but very precise information…
Appreciate your sharing this one. A must read article!
My relatives always say that I am wasting my time here at web, except I know I am getting experience daily by reading such pleasant posts.|
I’ll right away seize your rss feed as I can’t in finding your e-mail subscription link
or newsletter service. Do you’ve any? Please allow me understand so that I may subscribe.
Thanks.
Wow, awesome blog layout! How long have you been blogging for? you make blogging look easy. The overall look of your web site is excellent, let alone the content!
I conceive other website proprietors should take this website as an example , very clean and good user friendly style and design.
The next time I read a blog, I hope that it doesnt disappoint me as a lot as this one. I mean, I know it was my option to read, however I actually thought youd have one thing interesting to say. All I hear is a bunch of whining about something that you could possibly fix if you happen to werent too busy searching for attention.