{"title":"Enhancing Performance of Intrusion Detection through Soft Computing Techniques","authors":"M. Patra, Ashalata Panigrahi","doi":"10.1109/ISCBI.2013.17","DOIUrl":null,"url":null,"abstract":"The worldwide rapid expansion of computer networks and ever growing dependence of organizations on network based information management have led to serious security concerns. Among other security threats network intrusion has been a major concern which requires considerable attention in order to protect the information resources that are accessible via network infrastructure. Though different intrusion detection approaches have been experimented but none of them can guarantee complete protection against network intrusions. Furthering research in this direction, we have been exploring the use of soft computing techniques to analyze intrusion data in order to detect intrusive behavior in network access patters. In this paper, we have carried out some experiments using techniques such as Radial Basis Function Network (RBFN), Self-Organizing Map (SOM), Support Vector Machine (SVM), back propagation, and J48 on the NSL-KDD intrusion data set in order to evaluate the performance of each of the techniques. We have also compared the performance of these techniques with respect to the detection and false alarm rates.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 International Symposium on Computational and Business Intelligence","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCBI.2013.17","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
The worldwide rapid expansion of computer networks and ever growing dependence of organizations on network based information management have led to serious security concerns. Among other security threats network intrusion has been a major concern which requires considerable attention in order to protect the information resources that are accessible via network infrastructure. Though different intrusion detection approaches have been experimented but none of them can guarantee complete protection against network intrusions. Furthering research in this direction, we have been exploring the use of soft computing techniques to analyze intrusion data in order to detect intrusive behavior in network access patters. In this paper, we have carried out some experiments using techniques such as Radial Basis Function Network (RBFN), Self-Organizing Map (SOM), Support Vector Machine (SVM), back propagation, and J48 on the NSL-KDD intrusion data set in order to evaluate the performance of each of the techniques. We have also compared the performance of these techniques with respect to the detection and false alarm rates.