Downloads: 143 | Views: 309 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper | Computer Science & Engineering | Sudan | Volume 6 Issue 9, September 2017 | Popularity: 6.9 / 10
Intrusion Detection System Using Weka Data Mining Tool
Asma Abbas Hassan, Alaa F. Sheta, Talaat M. Wahbi
Abstract: Traditional intrusion prevention techniques, such as firewalls, access control or encryption, have failed to fully protect networks and systems from increasing attacks. Therefore an intrusion detection system (IDS) has become an important component of security infrastructure and a key part of system defense to detect these attacks before they make a disaster in the system. In this paper, we are going to design an intrusion detection system using Weka Data Mining Software, to check the existence of intrusion, and classify it when detected, to know the type of intrusion, according to attack types, this will implemented in Weka 3.6 Software, with KDD CUP 99 intrusion detection dataset. We construct a system with a very accurate, flexible and effective results when compare with other systems
Keywords: intrusion detection, Naive bayes, Decision Trees, Random Forest, Random Tree, Confusion Matrix
Edition: Volume 6 Issue 9, September 2017
Pages: 337 - 342
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2246 - 2249Packet Analysis with Network Intrusion Detection System
Rashmi Hebbar, Mohan K
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, Bangladesh, Volume 13 Issue 7, July 2024
Pages: 538 - 543Evaluate the Predictive Performance of Supervised Machine Learning Algorithms in Diabetes Dataset
Md. Jamaner Rahaman
Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 12 Issue 8, August 2023
Pages: 2571 - 2575Enhancing IoT Cybersecurity with Graph Neural Networks: Advanced Anomaly Detection and Threat Mitigation
Harish Narne
Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 12, December 2021
Pages: 158 - 161MLP and RNN Based Intrusion Detection System Using Machine Learning with Stochastic Optimization
Mithlesh Kumar, Gargishankar Verma
Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Informative Article, Computer Science & Engineering, India, Volume 11 Issue 8, August 2022
Pages: 1497 - 1500Innovative Approach to Mitigate Man-in-the-Middle Attacks in Secure Communication Channels
Arnab Dey