z-logo
open-access-imgOpen Access
Host based Intrusion Detection System HIDS
Author(s) -
Anil Kumar Yadav,
Abhishek Srivastav,
A.P. Tiwari,
Krishna Vir Singh
Publication year - 2020
Publication title -
international journal of engineering and advanced technology
Language(s) - English
Resource type - Journals
ISSN - 2249-8958
DOI - 10.35940/ijeat.e9903.069520
Subject(s) - computer science , intrusion detection system , data mining , denial of service attack , process (computing) , anomaly detection , data set , host (biology) , false positive rate , set (abstract data type) , anomaly based intrusion detection system , feature extraction , signature (topology) , network security , constant false alarm rate , artificial intelligence , computer security , the internet , ecology , geometry , mathematics , biology , world wide web , programming language , operating system
This paper presents the data analysis and feature extraction of KDD dataset of 1999. This is used to detect signature based and anomaly attacks on a system. The process is supported by data extraction as well as data cleaning of the above mentioned data set. The dataset consists of 42 parameters and 58 services. These parameters are further filtered to extract useful attributes. Every attack in the dataset is labeled either with “normal” or into four different attack types i.e. denial-of-service, network probe, remote-to-local or user-to-root. Using different machine learning algorithms, the work tries to compare the individual accuracy, True Positive and False positive rate of every algorithm with every other algorithm. The work focuses its attention to increase security through detection of static as well as dynamic attack.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here