Intrusion Detection System (IDS) is the science of detection of malicious activity on a computer network and the basic driver for network security. It is defined as a process of monitoring the events occurring in a computer system or network and analyzing them to differentiate between normal activities of the system and behaviors that can be classified as suspicious or intrusive. In this paper identifying the network attacks and comparing the performance of the algorithms is performed respectively. The Dimension Reduction focuses on using information obtained KDD Cup 99 data set for the selection of attributes to identify the type of attacks. The dimensionality reduction is performed on 41 attributes to 14 and 7 attributes based on Best First Search method and then apply the two classifying Algorithms ID3 and J48.
[1]
Siti Mariyam Shamsuddin,et al.
Ensemble classifiers for network intrusion detection system
,
2009
.
[2]
Kristopher Kendall,et al.
A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems
,
1999
.
[3]
Hossein Shirazi.
Anomaly Intrusion Detection System Using Information Theory, K-NN and KMC Algorithms
,
2009
.
[4]
T. Medhat,et al.
Dimensionality Reduction Using Rough Set Approach for Two Neural Networks-Based Applications
,
2007,
RSEISP.
[5]
Li Guo,et al.
An active learning based TCM-KNN algorithm for supervised network intrusion detection
,
2007,
Comput. Secur..