Please use this identifier to cite or link to this item:
Title: Soft-computing-based false alarm reduction for hierarchical data of intrusion detection system
Authors: Singh, Parminder 
Krishnamoorthy, Sujatha 
Nayyar, Anand 
Luhach, Ashish K. 
Kaur, Avinash 
Issue Date: 2019
Publisher: SAGE Publications
Source: Singh, P., Krishnamoorthy, S., Nayyar, A., Luhach, A. K., & Kaur, A. (2019). Soft-computing-based false alarm reduction for hierarchical data of intrusion detection system. International Journal of Distributed Sensor Networks, 15(10), 1550147719883132.
Journal: International Journal of Distributed Sensor Networks 
Abstract: A false alarm rate of online anomaly-based intrusion detection system is a crucial concern. It is challenging to implement in the real-world scenarios when these anomalies occur sporadically. The existing intrusion detection system has been developed to limit or decrease the false alarm rate. However, the state-of-the-art approaches are attack or algorithm specific, which is not generic. In this article, a soft-computing-based approach has been designed to reduce the false-positive rate for hierarchical data of anomaly-based intrusion detection system. The recurrent neural network model is applied to classify the data set of intrusion detection system and normal instances for various subclasses. The designed approach is more practical, reason being, it does not require any assumption or knowledge of the data set structure. Experimental evaluation is conducted on various attacks on KDDCup’99 and NSL-KDD data sets. The proposed method enhances the intrusion detection systems that can work with data with dependent and independent features. Furthermore, this approach is also beneficial for real-life scenarios with a low occurrence of attacks.
DOI: 10.1177/1550147719883132
Appears in Collections:Scholarly Publications

Files in This Item:
File Description SizeFormat 
wku_schlrs_publcn_000118.pdf898.13 kBAdobe PDFThumbnail
Show full item record

Page view(s)

checked on Mar 24, 2023


checked on Mar 24, 2023

Google ScholarTM



This item is licensed under a Creative Commons License Creative Commons