Abstract
Intrusion detection system (IDS) is one of the complete solution against harmful attacks, as well as the attackers always keep changeable their tools and techniques. However, implementing an approved intrusion detection system is also a challenging task. In this paper, we have taken the dataset of KDDCUP99. KDD cup99 is the most widely used data set for the evaluation of the system in anomaly based detection. This paper we have used twelve attributes from the KDD 99 dataset and weka tool for simulation. In this paper J-48 with other classifier shows the better results in terms of precision and recall metrics. It achieves to compute several performance metrics are available for the measurement in order to evaluate the selected classifiers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Othman, S.M., Ba-Alwi, F.M., Alsohybe, N.T., Al-Hashida, A.Y.: Intrusion detection model using machine learning algorithm on Big Data environment. J. Big Data 5(1), 34 (2018)
Borkar, A., Donode, A., Kumari, A.: A survey on intrusion detection system (IDS) and internal intrusion detection and protection system (IIDPS). In: 2017 International Conference on Inventive Computing and Informatics (ICICI), pp. 949–953. IEEE (2017)
Zhao, W.: The study and implement of the high-speed EMU’s operation and maintenance decision knowledgebase, Jiaotong University, Beijing (2016)
Khanna, R., Liu, H.: System approach to intrusion detection using hidden markov model. In: Proceedings of the 2006 International Conference on Wireless Computations and Mobile Computing, pp. 349–354. ACM (2006)
Zolotukhin M, Hämäläinen T, Kokkonen T, et al. Analysis of HTTP requests for anomaly detection of web attacks. In: 2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing (DASC), pp. 406–411. IEEE (2014)
Eason, G., Noble, B., Sneddon, I.N.: On certain integrals of Lipschitz-Hankel type involving products of Bessel functions. Phil. Trans. Roy. Soc. Lond. A247, 529–551 (1955)
Maxwell, J.C.: A Treatise on Electricity and Magnetism, 3rd edn. vol. 2, pp. 68–73, Clarendon, Oxford (1892)
Jacobs, I.S., Bean, C.P.: Fine particles, thin films and exchange anisotropy. In: Rado, G.T., Suhl, H., (eds.) Magnetism, vol. III, pp. 271–350. Academic, New York (1963)
Elissa, K.: Title of paper if known (unpublished)
Nicole, R.: Title of paper with only first word capitalized. J. Name Stand. Abbrev. (in press)
Yorozu, T., Hirano, M., Oka, K., Tagawa, Y.: Electron spectroscopy studies on magneto-optical media and plastic substrate interface. IEEE Trans. J. Magn. Jpn. 2, 740–741 (1987). Digests 9th Annual Conference on Magnetics Japan, p. 301 (1982)
Young, M.: The Technical Writer’s Handbook. University Science, Mill Valley (1989)
Belouch, M., El Hadaj, S., Idhammad, M.: Performance evaluation of intrusion detection based on machine learning using Apache Spark. Proc. Comput. Sci. 127, 1–6 (2018)
Singh, S., Bansal, M.: Improvement of intrusion detection system in data mining using neural network. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(9) (2013). kkyuu
Alom, Md.Z., Taha, T.M.: Network intrusion detection for cyber security on neuromorphic computing system. In: 2017 International Joint Conference on Neural Networks (IJCNN). IEEE (2017)
Vimalkumar, K., Radhika, N.: A big data framework for intrusion detection in smart grids using Apache Spark. In: 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE (2017)
Arora, R.: Comparative analysis of classification algorithms on different datasets using WEKA. Int. J. Comput. Appl. 54(13) (2012)
Arora, K., Chauhan, R.: Improvement in the performance of deep neural network model using learning rate. In: 2017 Innovations in Power and Advanced Computing Technologies (i- PACT). IEEE (2017)
Gupta, G.P., Kulariya, M.: A framework for fast and efficient cyber security network intrusion detection using apache spark. Proc. Comput. Sci. 93, 824–831 (2016)
Kulariya, M., et al.: Performance analysis of network intrusion detection schemes using Apache Spark. In: 2016 International Conference on Communication and Signal Processing (ICCSP). IEEE (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Singhal, S., Yadav, P. (2019). Evaluation of Model Using J-48 and Other Classifier on Kddcup99 Through Performance Metrics. In: Luhach, A., Jat, D., Hawari, K., Gao, XZ., Lingras, P. (eds) Advanced Informatics for Computing Research. ICAICR 2019. Communications in Computer and Information Science, vol 1075. Springer, Singapore. https://doi.org/10.1007/978-981-15-0108-1_2
Download citation
DOI: https://doi.org/10.1007/978-981-15-0108-1_2
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0107-4
Online ISBN: 978-981-15-0108-1
eBook Packages: Computer ScienceComputer Science (R0)