• Feb 07, 2023 News!JACN will adopt Article-by-Article Work Flow. The benefit of article-by-article workflow is that a delay with one article may not delay the entire issue. Once a paper steps into production, it will be published online soon.   [Click]
  • May 30, 2022 News!JACN Vol.10, No.1 has been published with online version.   [Click]
  • Dec 24, 2021 News!Volume 9 No 1 has been indexed by EI (inspec)!   [Click]
General Information
    • ISSN: 1793-8244 (Print)
    • Abbreviated Title:  J. Adv. Comput. Netw.
    • Frequency: Semiyearly
    • DOI: 10.18178/JACN
    • Editor-in-Chief: Professor Haklin Kimm
    • Executive Editor: Ms. Cherry Chan
    • Abstracting/ Indexing: EBSCO, ProQuest, and Google Scholar.
    • E-mail: jacn@ejournal.net
Editor-in-chief
Professor Haklin Kimm
East Stroudsburg University, USA
I'm happy to take on the position of editor in chief of JACN. We encourage authors to submit papers on all aspects of computer networks.

JACN 2014 Vol.2(4): 261-268 ISSN: 1793-8244
DOI: 10.7763/JACN.2014.V2.123

Improve Accuracy of Intrusion Detection System Using the Synthesis Computing Classifier Methodology

M. V. Siva Prasad and Ravi Gottipati

Abstract—Network security is the most critical part in organizations, social and enterprise systems. There are different levels in security. (The first level being preventions) The Most important level is Intrusion Detection System (IDS). IDS’s are responsible for monitoring security issues, network traffic etc., But it’s most essential task is detection of intrusions. Computing classifiers play a major role in all research areas including IDS. IDS have been achieved following different procedures and methods which have been projected in various research works. But, many of them aren't able to compute the problem with full accuracy assessment. So, main objective of my research work is to integrate numerous computing techniques into a categorized system, to detect and classify intrusions from usual activities based on the attack type in a computer network and try to improve the accuracy assessment. One of the most used mechanisms for creating rule sets is Decision-tree approach. Decision tree creations, using numerous algorithms, have been produced by different people. So far, the best algorithm is a C4.5/SEE 5.0. Using this algorithm constructs rule set 1. More than this a prominent approach to create rules other hand soft computing methods is Neural Network Theory and Fuzzy Logic. The next step, to create rule set 2, using both approaches are amalgamate and allocate. Final rule set derivation, in a process called Synthesis Computing Classifiers, can be done using Build decision boundary methodology based on the above rule set1 and set 2. The investigational result sets clearly show that the proposed new systems have achieved higher precision in identifying whether the records are normal or attack one.

Index Terms—Intrusion detection system (IDS), C4.5/SEE5.0, neural network theory, fuzzy logic, build decision boundary and synthesis computing classifiers.

M. V. Siva Prasad is with the Anurag Engineering College, Kodad 508206, India (e-mail: magantisivaprasad@gmail.com).
Ravi Gottipati is with the Tripod Technologies, Hyderabad 500082, India (e-mail: softtotime@gmail.com).

[PDF]

Cite:M. V. Siva Prasad and Ravi Gottipati, "Improve Accuracy of Intrusion Detection System Using the Synthesis Computing Classifier Methodology," Journal of Advances in Computer Networks vol. 2, no. 4, pp. 261-268, 2014.

Copyright © 2008-2024. Journal of Advances in Computer Networks.  All rights reserved.
E-mail: jacn@ejournal.net