An Competent Intrusion Detection System using

Nowadays everyone needs Internet for their useful. So internet becomes a public network in the world wide. Intrusion Detection (ID) is the art of detecting inappropriate, incorrect, or anomalous activity. It is a security service that monitors and analyzes system events for the idea of finding, and providing near real-time or realtime notice of, attempts in order to access system resources in an unauthorized manner In proposed system the `relevance vector machine' (RVM), a model of same functional form to the popular and state-of-the-art `support vector machine' (SVM). It demonstrate that by exploiting a probabilistic Bayesian learning framework and it can derive accurate prediction models which typically utilize dramatically fewer basis functions than a comparable SVM. These include the benefits of probabilistic predictions, automatic estimation of `nuisance' parameters and the facility to utilize arbitrary basis functions. The experiment is carried out with the help of MATLAB and WEKA by using KDD Cup 1999 dataset and the results indicate that the proposed technique can achieve higher detection rate and very low false alarm rate than the regular SVM algorithms.

[1]  Rebecca Gurley Bace,et al.  Intrusion Detection , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..

[2]  Rensheng Wang,et al.  Search Strategy Optimization for Intruder Detection , 2007, IEEE Sensors Journal.

[3]  Lilly Suriani Affendey,et al.  Intrusion detection using data mining techniques , 2010, 2010 International Conference on Information Retrieval & Knowledge Management (CAMP).

[4]  Richard A. Kemmerer,et al.  State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..

[5]  Joseph G. Tront,et al.  Internet Security: Intrusion Detection and Prevention in Mobile Systems , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).

[6]  David J. Marchette A Statistical Method for Profiling Network Traffic , 1999, Workshop on Intrusion Detection and Network Monitoring.

[7]  Jerzy W. Rozenblit,et al.  Alert Fusion for a Computer Host Based Intrusion Detection System , 2007, 14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems (ECBS'07).

[8]  Vivek K. Kshirsagar,et al.  Intrusion Detection System using Genetic Algorithm and Data Mining: An Overview , 2012 .

[9]  Alfonso Valdes,et al.  Next-generation Intrusion Detection Expert System (NIDES)A Summary , 1997 .

[10]  Frederick M. Avolio Putting it together a multi-dimensional approach to Internet security , 1998, NTWK.