Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/120011
Title: | Certain investigations on the performance of swarm based classification algorithms for intrusion detection using feature selection methods |
Researcher: | AMUDHA P |
Guide(s): | Karthik S |
Keywords: | Algorithms Information and Communication Engineering Swarm Based Classification Algorithms |
University: | Anna University |
Completed Date: | 01/12/2015 |
Abstract: | newlineThere is a tremendous growth in the field of information technology due to which network security is also facing significant challenges The traditional Intrusion Detection System IDS is unable to handle the recent attacks and malwares Hence Intrusion Detection System IDS which is an indispensable component of the network needs to be protected IDS methodologies which are currently in use require human intervention to generate attack signatures or to determine effective models for normal behaviour In order to provide a potential alternative to expensive newlinehuman input we are in need of learning algorithms The predominant task of such learning algorithm is to discover appropriate behaviour of IDS as normal and abnormal system is under attack The algorithm should be accurate and it should process the information in quick successions which is one of the major drawbacks in IDS because of the large amount of features newlineData mining based network intrusion detection is widely used to identify how and where the intrusions occur Reducing the number of features by selecting the important features is critical to improve the accuracy and speed of classification algorithms Hence selecting the significant newlinefeatures and developing the best classifier model in terms of high accuracy and detection rates is the focus of the proposed method The ultimate goal is to choose an effective classification approach for developing an accurate intrusion detection model In order to improve the accuracy of an individual classifier we combine the classifiers which is the prevalent approach Recently application of swarm intelligence technique for intrusion detection has gained prominence among the research community newline |
Pagination: | xxii,136p. |
URI: | http://hdl.handle.net/10603/120011 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 1.59 MB | Adobe PDF | View/Open |
02_certificates.pdf | 1.91 MB | Adobe PDF | View/Open | |
03_abstracts.pdf | 1.63 MB | Adobe PDF | View/Open | |
04_acknowledgement.pdf | 657.37 kB | Adobe PDF | View/Open | |
05_contents.pdf | 1.7 MB | Adobe PDF | View/Open | |
06_list_of_tables.pdf | 1.61 MB | Adobe PDF | View/Open | |
07_list_of_figures.pdf | 1.64 MB | Adobe PDF | View/Open | |
08_list_of_abbreviations .pdf | 1.63 MB | Adobe PDF | View/Open | |
09_chapter1.pdf | 2.35 MB | Adobe PDF | View/Open | |
10_chapter2.pdf | 1.8 MB | Adobe PDF | View/Open | |
11_chapter3.pdf | 1.95 MB | Adobe PDF | View/Open | |
12_chapter4.pdf | 2.2 MB | Adobe PDF | View/Open | |
13_chapter5.pdf | 2.11 MB | Adobe PDF | View/Open | |
14_chapter6.pdf | 2.66 MB | Adobe PDF | View/Open | |
15_chapter7.pdf | 1.63 MB | Adobe PDF | View/Open | |
16_appendices.pdf | 1.61 MB | Adobe PDF | View/Open | |
17_references.pdf | 1.84 MB | Adobe PDF | View/Open | |
18_list_of_publications.pdf | 1.62 MB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: