International Journal of Advance Computational Engineering and Networking (IJACEN)
.
Follow Us On :
current issues
Volume-12,Issue-9  ( Sep, 2024 )
Past issues
  1. Volume-12,Issue-8  ( Aug, 2024 )
  2. Volume-12,Issue-7  ( Jul, 2024 )
  3. Volume-12,Issue-6  ( Jun, 2024 )
  4. Volume-12,Issue-5  ( May, 2024 )
  5. Volume-12,Issue-4  ( Apr, 2024 )
  6. Volume-12,Issue-3  ( Mar, 2024 )
  7. Volume-12,Issue-2  ( Feb, 2024 )
  8. Volume-12,Issue-1  ( Jan, 2024 )
  9. Volume-11,Issue-12  ( Dec, 2023 )
  10. Volume-11,Issue-11  ( Nov, 2023 )

Statistics report
Jan. 2025
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 141
Paper Published : 1672
No. of Authors : 4423
  Journal Paper


Paper Title :
Intrusion Detection System for Data Security

Author :Rachakonda Ishwarya, Rondi Nireekshana, Punna Sai Tharun, Y. Mareshwara Rao

Article Citation :Rachakonda Ishwarya ,Rondi Nireekshana ,Punna Sai Tharun ,Y. Mareshwara Rao , (2024 ) " Intrusion Detection System for Data Security " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 57-62, Volume-12,Issue-7

Abstract : Due to the quick improvement in network activity and increasing security threats, Intrusion Detection Systems (IDS) have become progressively essential in the field of cybersecurity for providing secure communications against cyber adversaries. However, there exist various challenges in designing an effective, efficient, and accurate IDS, especially when dealing with high-dimensional anomaly data with unpredictable and unusual attacks. In this paper, we propose an Intrusion Detection System (IDS) model simulating feature representations to balance dimensionality reduction and feature preservation in an imbalanced dataset. The proposed technique utilizes a Random Forest approach after preprocessing the dataset. Extensive experiments reveal the effectiveness of the proposed strategy on publicly available legitimate traffic intrusion detection datasets, CICIDS2017 and CIC-DDoS2019, achieving F1-Scores of 99.17% and 99.2% respectively. A comparative analysis with classical machine learning algorithms like Support Vector Machine (SVM) and deep learning algorithms, such as Recurrent Neural Network (RNN), Feedforward Neural Network (FNN), and Long Short-Term Memory (LSTM) network, is conducted to validate the proposed approach. Keywords - Intrusion detection, feature extraction, balancing dataset, data preprocessing, data splitting, confusion matrix

Type : Research paper

Published : Volume-12,Issue-7


DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-21098   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 24
| Published on 2024-10-17
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY