Abstract

In the advent of the cyber world, all know that cyber security is randomly used research area for researchers to secure host, network, and data because of increasingly complex attacks. In the advent of anomaly-based intrusion detection system, various techniques are applied to detect intrusion on system or network. This approach attains an extreme detection rate and accuracy but there may be overhead acquired to build and training them. The objective of this paper is to detect the intrusion of a system by proposing a Data mining technique which is based on supervised learning algorithm for training dataset. Artificial neural network (ANN) and Ant Colony Optimization (ACO) with feature selection are the basics of the proposed scheme. ACO work on a population-based algorithm and is motivated by the pheromone trail laying behavior of real ants, in which NSL-KDD Cup99 Dataset is used. Empirical Results clearly explain that the proposed system can attain an overall detection rate of 88% and time complexity of 0.343 sec, which is satisfactory when compared to other anomaly-based schemes.

Highlights

  • In the era of digitization of data, security of the Network is the main objective because network services are enormously increasing day by day and they are targeted by attackers

  • That cyber security is subsequently turn to main concern

  • Matrix manipulation, plotting of graph, develop an algorithm, create the mathematical model, and interfacing with another language with programs written in another language like C, C++, C#, Java, FORTRAN, and Python

Read more

Summary

Introduction

In the era of digitization of data, security of the Network is the main objective because network services are enormously increasing day by day and they are targeted by attackers. These types of attackers are harm network as well as host machine [1]. Security of network define level of protection and primary objective of security is to achieve these principle; Confidentiality, Availability, and Integrity of data [4]. Researchers create a method for securing the system from an external device, programs, and that user/ attacker who's only goal to destroy security services of the network

Objectives
Methods
Findings
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.