Skip to main content

Evaluation of Model Using J-48 and Other Classifier on Kddcup99 Through Performance Metrics

  • Conference paper
  • First Online:
Advanced Informatics for Computing Research (ICAICR 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1075))

  • 615 Accesses

Abstract

Intrusion detection system (IDS) is one of the complete solution against harmful attacks, as well as the attackers always keep changeable their tools and techniques. However, implementing an approved intrusion detection system is also a challenging task. In this paper, we have taken the dataset of KDDCUP99. KDD cup99 is the most widely used data set for the evaluation of the system in anomaly based detection. This paper we have used twelve attributes from the KDD 99 dataset and weka tool for simulation. In this paper J-48 with other classifier shows the better results in terms of precision and recall metrics. It achieves to compute several performance metrics are available for the measurement in order to evaluate the selected classifiers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Othman, S.M., Ba-Alwi, F.M., Alsohybe, N.T., Al-Hashida, A.Y.: Intrusion detection model using machine learning algorithm on Big Data environment. J. Big Data 5(1), 34 (2018)

    Article  Google Scholar 

  2. Borkar, A., Donode, A., Kumari, A.: A survey on intrusion detection system (IDS) and internal intrusion detection and protection system (IIDPS). In: 2017 International Conference on Inventive Computing and Informatics (ICICI), pp. 949–953. IEEE (2017)

    Google Scholar 

  3. Zhao, W.: The study and implement of the high-speed EMU’s operation and maintenance decision knowledgebase, Jiaotong University, Beijing (2016)

    Google Scholar 

  4. Khanna, R., Liu, H.: System approach to intrusion detection using hidden markov model. In: Proceedings of the 2006 International Conference on Wireless Computations and Mobile Computing, pp. 349–354. ACM (2006)

    Google Scholar 

  5. Zolotukhin M, Hämäläinen T, Kokkonen T, et al. Analysis of HTTP requests for anomaly detection of web attacks. In: 2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing (DASC), pp. 406–411. IEEE (2014)

    Google Scholar 

  6. Eason, G., Noble, B., Sneddon, I.N.: On certain integrals of Lipschitz-Hankel type involving products of Bessel functions. Phil. Trans. Roy. Soc. Lond. A247, 529–551 (1955)

    Article  MathSciNet  Google Scholar 

  7. Maxwell, J.C.: A Treatise on Electricity and Magnetism, 3rd edn. vol. 2, pp. 68–73, Clarendon, Oxford (1892)

    Google Scholar 

  8. Jacobs, I.S., Bean, C.P.: Fine particles, thin films and exchange anisotropy. In: Rado, G.T., Suhl, H., (eds.) Magnetism, vol. III, pp. 271–350. Academic, New York (1963)

    Google Scholar 

  9. Elissa, K.: Title of paper if known (unpublished)

    Google Scholar 

  10. Nicole, R.: Title of paper with only first word capitalized. J. Name Stand. Abbrev. (in press)

    Google Scholar 

  11. Yorozu, T., Hirano, M., Oka, K., Tagawa, Y.: Electron spectroscopy studies on magneto-optical media and plastic substrate interface. IEEE Trans. J. Magn. Jpn. 2, 740–741 (1987). Digests 9th Annual Conference on Magnetics Japan, p. 301 (1982)

    Article  Google Scholar 

  12. Young, M.: The Technical Writer’s Handbook. University Science, Mill Valley (1989)

    Google Scholar 

  13. Belouch, M., El Hadaj, S., Idhammad, M.: Performance evaluation of intrusion detection based on machine learning using Apache Spark. Proc. Comput. Sci. 127, 1–6 (2018)

    Article  Google Scholar 

  14. Singh, S., Bansal, M.: Improvement of intrusion detection system in data mining using neural network. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(9) (2013). kkyuu

    Google Scholar 

  15. Alom, Md.Z., Taha, T.M.: Network intrusion detection for cyber security on neuromorphic computing system. In: 2017 International Joint Conference on Neural Networks (IJCNN). IEEE (2017)

    Google Scholar 

  16. Vimalkumar, K., Radhika, N.: A big data framework for intrusion detection in smart grids using Apache Spark. In: 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE (2017)

    Google Scholar 

  17. Arora, R.: Comparative analysis of classification algorithms on different datasets using WEKA. Int. J. Comput. Appl. 54(13) (2012)

    Article  Google Scholar 

  18. Arora, K., Chauhan, R.: Improvement in the performance of deep neural network model using learning rate. In: 2017 Innovations in Power and Advanced Computing Technologies (i- PACT). IEEE (2017)

    Google Scholar 

  19. Gupta, G.P., Kulariya, M.: A framework for fast and efficient cyber security network intrusion detection using apache spark. Proc. Comput. Sci. 93, 824–831 (2016)

    Article  Google Scholar 

  20. Kulariya, M., et al.: Performance analysis of network intrusion detection schemes using Apache Spark. In: 2016 International Conference on Communication and Signal Processing (ICCSP). IEEE (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Saby Singhal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Singhal, S., Yadav, P. (2019). Evaluation of Model Using J-48 and Other Classifier on Kddcup99 Through Performance Metrics. In: Luhach, A., Jat, D., Hawari, K., Gao, XZ., Lingras, P. (eds) Advanced Informatics for Computing Research. ICAICR 2019. Communications in Computer and Information Science, vol 1075. Springer, Singapore. https://doi.org/10.1007/978-981-15-0108-1_2

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-0108-1_2

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-0107-4

  • Online ISBN: 978-981-15-0108-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics