Abstract
In the advent of the cyber world, all know that cyber security is randomly used research area for researchers to secure host, network, and data because of increasingly complex attacks. In the advent of anomaly-based intrusion detection system, various techniques are applied to detect intrusion on system or network. This approach attains an extreme detection rate and accuracy but there may be overhead acquired to build and training them. The objective of this paper is to detect the intrusion of a system by proposing a Data mining technique which is based on supervised learning algorithm for training dataset. Artificial neural network (ANN) and Ant Colony Optimization (ACO) with feature selection are the basics of the proposed scheme. ACO work on a population-based algorithm and is motivated by the pheromone trail laying behavior of real ants, in which NSL-KDD Cup99 Dataset is used. Empirical Results clearly explain that the proposed system can attain an overall detection rate of 88% and time complexity of 0.343 sec, which is satisfactory when compared to other anomaly-based schemes.
Highlights
In the era of digitization of data, security of the Network is the main objective because network services are enormously increasing day by day and they are targeted by attackers
That cyber security is subsequently turn to main concern
Matrix manipulation, plotting of graph, develop an algorithm, create the mathematical model, and interfacing with another language with programs written in another language like C, C++, C#, Java, FORTRAN, and Python
Summary
In the era of digitization of data, security of the Network is the main objective because network services are enormously increasing day by day and they are targeted by attackers. These types of attackers are harm network as well as host machine [1]. Security of network define level of protection and primary objective of security is to achieve these principle; Confidentiality, Availability, and Integrity of data [4]. Researchers create a method for securing the system from an external device, programs, and that user/ attacker who's only goal to destroy security services of the network
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Engineering and Advanced Technology
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.