Comparison of soft-computing techniques for classification of intrusion-detection

  • Authors:
  • Hind Tribak;I. Rojas;O. Valenzuela

  • Affiliations:
  • Dpto. Computer Architecture and Techonology, Dpto. Applied Mathematics;Dpto. Computer Architecture and Techonology, Dpto. Applied Mathematics;Dpto. Computer Architecture and Techonology, Dpto. Applied Mathematics

  • Venue:
  • MMES'10 Proceedings of the 2010 international conference on Mathematical models for engineering science
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

One of the main weaknesses of signature-based intrusion-detection systems (IDSs) is their inability to detect new attacks or new versions of already known attack patterns. This topic has attracted the attention of many researchers over the past decade and has resulted, amongst other alternatives, in anomaly-based IDSs, which use statistical and/or data-mining techniques as a new approach to intrusion detection. Herein we present a comparison of classifiers known as Decision Trees and SVM machines, both of which use data-mining techniques, with and without applying attribute selection techniques, with the KDDCUP'99 data set and the Weka tool.