A review on Attribute Selection for Intrusion Detection System with Evolutionary Algorithm

The process of clustering technique plays an important role in intrusion detection system. The processes of clustering technique grouped the network traffic data on the basis of similarity and validate the traffic data. The process of clustering suffered from the problem of large number of iteration and loss of data. Now a day’s various authors used various optimization technique for the controlling the number of iteration and selection of seed. In this paper present review of intrusion detection techniques for clustering data using KDDCUP dataset which include both normal and abnormal data.

[1]  S J Ghule,et al.  Network Intrusion Detection System using Fuzzy Logic , 2014 .

[2]  Sang-Hwa Chung,et al.  An Enhanced TCP Scheme for Distinguishing Non-congestion Losses from Packet Reordering over Wireless Mesh Networks , 2011, 2011 IEEE International Conference on High Performance Computing and Communications.

[3]  Shen Li,et al.  An efficient architecture for Network Intrusion Detection based on Ensemble Rough Classifiers , 2013, 2013 8th International Conference on Computer Science & Education.

[4]  Shingo Mabu,et al.  Network intrusion detection using fuzzy class association rule mining based on genetic network programming , 2009, 2009 IEEE International Conference on Systems, Man and Cybernetics.

[5]  Qing Qing Zhang,et al.  An Effective Pattern Matching Algorithm for Intrusion Detection , 2014 .

[6]  Li Guo,et al.  An active learning based TCM-KNN algorithm for supervised network intrusion detection , 2007, Comput. Secur..

[7]  Rayford B. Vaughn,et al.  Fuzzy cognitive maps for decision support in an intelligent intrusion detection system , 2001, Proceedings Joint 9th IFSA World Congress and 20th NAFIPS International Conference (Cat. No. 01TH8569).

[8]  Xie Yong,et al.  A descending suffix tree-based pattern matching algorithm for intrusion detection , 2012, 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet).

[9]  Hu Han Performance improvement of TCP_Reno based on monitoring the wireless packet loss rate , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[10]  Fang Zhang,et al.  Research of intrusion detection based on genetic clustering algorithm , 2012, 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet).

[11]  Mansour Sheikhan,et al.  Misuse Detection Using Hybrid of Association Rule Mining and Connectionist Modeling , 2009 .

[12]  Anurag Jain,et al.  INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & MANAGEMENT A NOVEL METHOD FOR INTRUSION DETECTION BASED ON ECC AND RADIAL BIAS FEED FORWORD NETWORK , 2012 .

[13]  Yang Li,et al.  Building lightweight intrusion detection system using wrapper-based feature selection mechanisms , 2009, Comput. Secur..

[14]  Anurag Shrivastava,et al.  Improved Intrusion Detection Technique based on Feature Reduction and Classification using Support Vector Machine and Particle of Swarm Optimization , 2014 .

[15]  R. Shanmugavadivu NETWORK INTRUSION DETECTION SYSTEM USING FUZZY LOGIC , 2011 .