Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/420861
Title: Ensemble Approach for Feature Selection and Classification in Intrusion Detection System
Researcher: Kharwar, Ankit Rajeshkumar
Guide(s): Thakor, Devendra V.
Keywords: Computer Engineering
Engineering and Technology
Network data security
University: Uka Tarsadia University
Completed Date: 2022
Abstract: Network data security is a global issue for governments, businesses, and individuals. The frequency of attacks is rapidly growing, and attackers techniques are evolving. Attackers may get unauthorized access to resources or services through harmful behavior. Many techniques (such as firewalls, anti-viruses, anti-malware, and spam filters) are utilized as network security technologies. An Intrusion Detection System (IDS) is a robust network security system that detects illegal and irregular network activity (e.g., DDoS attack, Ransomware attack, Botnet attack, etc.). On the other hand, firewalls and traditional IDS constantly update their defined databases to identify threats. Various strategies and solutions have been proposed in recent decades to solve the limitations of IDS, such as high false alarm rates, low accuracy, and time consumption. newlineMany machine learning methods have been investigated for IDS in order to detect unknown attacks. However, in real-world applications, classifier performance may vary with diverse datasets, with one of the key reasons being redundant or inefficient features. This thesis analyses feature selection methods and present an ensemble method to increase detection performance to address this issue. Using ensemble classifiers generally outperforms compare to a single classifier. This thesis aims to offer design techniques for effective IDS. The new IDS approaches attempt to use machine learning models to create robust systems. newlineThe proposed model includes the following steps: selection of raw data, data preprocessing, feature selection, classification, and performance evaluation. Our experiment used benchmark datasets (KDD 99, NSL-KDD, and UNSW-NB15) and the most recent datasets (CICIDS2017 and CICIDS2018) in the first step. Three stages are involved in the preprocessing in the second step. It eliminates duplicate entries from the dataset in the first stage. In the second stage, we classify each attack into fundamental attack categories.
Pagination: xxiii,157p
URI: http://hdl.handle.net/10603/420861
Appears in Departments:Faculty of Engineering and Technology

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File79.4 kBAdobe PDFView/Open
02_preliminary pages.pdf9.69 MBAdobe PDFView/Open
03_contents.pdf52.89 kBAdobe PDFView/Open
04_abstract.pdf77.86 kBAdobe PDFView/Open
05_chapter 1.pdf288.7 kBAdobe PDFView/Open
06_chapter 2.pdf332.48 kBAdobe PDFView/Open
07_chapter 3.pdf2 MBAdobe PDFView/Open
08_chapter 4.pdf900.44 kBAdobe PDFView/Open
09_chapter 5.pdf958.21 kBAdobe PDFView/Open
10_chapter 6.pdf1.25 MBAdobe PDFView/Open
11_chapter 7.pdf1.05 MBAdobe PDFView/Open
12_chapter 8.pdf1.14 MBAdobe PDFView/Open
13_chapter 9.pdf184.51 kBAdobe PDFView/Open
14_chapter 10.pdf53.1 kBAdobe PDFView/Open
15_chapter 11.pdf49.3 kBAdobe PDFView/Open
16_annexures.pdf2.87 MBAdobe PDFView/Open
80_recommendation.pdf115.42 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: