Table of Contents Author Guidelines Submit a Manuscript
Journal of Electrical and Computer Engineering
Volume 2017, Article ID 1794849, 6 pages
https://doi.org/10.1155/2017/1794849
Research Article

Security Enrichment in Intrusion Detection System Using Classifier Ensemble

1Smt. Kashibai Navale College of Engineering, Savitribai Phule Pune University, Pune, India
2Sinhgad Institute of Technology and Science, Savitribai Phule Pune University, Narhe, Pune, India

Correspondence should be addressed to Uma R. Salunkhe; moc.oohay@ehknulasamu

Received 6 January 2017; Accepted 20 February 2017; Published 12 March 2017

Academic Editor: Arun K. Sangaiah

Copyright © 2017 Uma R. Salunkhe and Suresh N. Mali. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. O. Y. Al-Jarrah, O. Alhussein, P. D. Yoo, S. Muhaidat, K. Taha, and K. Kim, “Data randomization and cluster-based partitioning for botnet intrusion detection,” IEEE Transactions on Cybernetics, vol. 46, no. 8, pp. 1796–1806, 2016. View at Publisher · View at Google Scholar · View at Scopus
  2. K. Kumar and S. Singh, “Intrusion Detection Using Soft Computing Techniques,” 2016.
  3. S. Rajasegarar, C. Leckie, J. C. Bezdek, and M. Palaniswami, “Centered hyperspherical and hyperellipsoidal one-class support vector machines for anomaly detection in sensor networks,” IEEE Transactions on Information Forensics and Security, vol. 5, no. 3, pp. 518–533, 2010. View at Publisher · View at Google Scholar · View at Scopus
  4. A. L. Buczak and E. Guven, “A survey of data mining and machine learning methods for cyber security intrusion detection,” IEEE Communications Surveys and Tutorials, vol. 18, no. 2, pp. 1153–1176, 2016. View at Publisher · View at Google Scholar · View at Scopus
  5. K.-C. Khor, C.-Y. Ting, and S. Phon-Amnuaisuk, “A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection,” Applied Intelligence, vol. 36, no. 2, pp. 320–329, 2012. View at Publisher · View at Google Scholar · View at Scopus
  6. A. A. Aburomman and M. B. Ibne Reaz, “A novel SVM-kNN-PSO ensemble method for intrusion detection system,” Applied Soft Computing Journal, vol. 38, pp. 360–372, 2016. View at Publisher · View at Google Scholar · View at Scopus
  7. Q. S. Qassim, A. M. Zin, and M. J. Ab Aziz, “Anomalies classification approach for network—based intrusion detection system,” International Journal of Network Security, pp. 1159–1171, 2016. View at Google Scholar
  8. M. Govindarajan, “Evaluation of ensemble classifiers for intrusion detection,” World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, vol. 10, no. 6, pp. 876–884, 2016. View at Google Scholar
  9. Z. Liu, R. Wang, and M. Tao, “SmoteAdaNL: a learning method for network traffic classification,” Journal of Ambient Intelligence and Humanized Computing, vol. 7, no. 1, pp. 121–130, 2016. View at Publisher · View at Google Scholar · View at Scopus
  10. W. Hu, J. Gao, Y. Wang, O. Wu, and S. Maybank, “Online adaboost-based parameterized methods for dynamic distributed network intrusion detection,” IEEE Transactions on Cybernetics, vol. 44, no. 1, pp. 66–82, 2014. View at Publisher · View at Google Scholar · View at Scopus
  11. M. Li, S. Pan, Y. Zhang, and X. Cai, “Classifying networked text data with positive and unlabeled examples,” Pattern Recognition Letters, vol. 77, pp. 1–7, 2016. View at Publisher · View at Google Scholar · View at Scopus
  12. W. Hu, W. Hu, and S. Maybank, “AdaBoost-based algorithm for network intrusion detection,” IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, vol. 38, no. 2, pp. 577–583, 2008. View at Publisher · View at Google Scholar · View at Scopus
  13. Z. Yu, J. J. P. Tsai, and T. Weigert, “An automatically tuning intrusion detection system,” IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, vol. 37, no. 2, pp. 373–384, 2007. View at Publisher · View at Google Scholar · View at Scopus
  14. N. A. Alrajeh, S. Khan, and B. Shams, “Intrusion detection systems in wireless sensor networks: a review,” International Journal of Distributed Sensor Networks, vol. 9, no. 5, Article ID 167575, 2013. View at Publisher · View at Google Scholar · View at Scopus