The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Today’s network world is facing lot of challenging task; Intrusion Detection is the method adopted to identify the unauthorised activities in the network. The type of malicious activities grows on increasing. There is very much essential to develop a new Intrusion Detection System, which can detect the malicious activities. The main purpose of our newly hybrid system is developed to identify both known and unknown attack. The proposed system is tested with the benchmark KDD ’99 intrusion data set. The proposed work also focuses on the detection rate and false alarm rate. The new system is developed with an optimized algorithm for feature to produce the reduced set of features. The attack detection rate is comparatively good; can be achieved by using layered approach with enhanced fuzzy multi-objective particle swarm optimization which does the feature selection effectively. The fuzzy based support vector machine algorithm is effectively applicable to detect anomaly attack. The newly described system is must more efficient in detection U2R attack, when compared with the existing methods takes long time for training to detect the unknown attack. Also our system is working with very less time for detection. The proposed system with the advantage of detection rate up to 99.1% and the false alarm rate is very much reduced.

Keywords

Attack, Computation, Fuzzy, Goodfit, Intrusion Detection, Objective Function, Optimization, Support Vector Machine
User