INTRUSION DETECTION SYSTEM USING CLASSIFICATION APPROACH IN DATA MINING

Main Article Content

Parminder Singh
Chandrashekhar Azad
Ashok Kumar Mehta

Abstract

Data on a networkcomprises of interrelated units. As an illustration, web pages on the World Wide Web are connected by hyperlinks and research papers are associated by references also phone accounts are linked by calls, and conceivable terrorists are linked by communications. Networks have turned out to be pervasive. Correspondence networks, financial transaction networks, networks portraying physical systems, and social networks are all ending up noticeably progressively important in our everyday life. Regularly, we are interested in models of how nodes in the system influence each other (for example, who taints whom in an epidemiological system), models for predicting an attribute of intrigue in light of observed attributes of objects in the system. The technique of SVM is applied which will classify the data into malicious and non-malicious.

 

Downloads

Download data is not yet available.

Article Details

Section
Articles

References

D. Rodrigues, E. Cerqueira, and E. Monteiro, “QoE Assessment of VoIP in Next Generation Networks,†MMNS 2009, LNCS 5842, International Federation for Information Processing, pp. 94-105, 2009.

James Yu, Imad Al Ajarmeh, “Design and Traffic Engineering of VoIP for Enterprise and Carrier Networksâ€, International Journal on Advances in Telecommunications, vol. 1, No. 1, 2008.

O. Hersent, J.P. Petit, and D. Gurle, “Beyond VoIP Protocols. Understanding Voice Technology and Networking Techniques for IP Telephony,†John Wiley & Sons Ltd, 2005.

C. Olariu, J. Fitzpatrick, P. Perry, and L. Murphy, “A QoS based call admission control and resource allocation mechanism for LTE femtocell deployment,†in Consumer Communications and Networking Conference (CCNC), 2012 IEEE. IEEE, 2012, pp. 884–888.

M. Afaq, S. U. Rehman, and W. C. Song, “Visualization of elephant flows and qos provisioning in sdn-based networks,†in Network Operations and Management Symposium (APNOMS), 2015 17th Asia-Pacific, Aug 2015, pp. 444–447.

C. Xu, B. Chen, and H. Qian, “Quality of service guaranteed resource management dynamically in software defined network,†Journal of Communications, vol. 10, no. 11, 2015.

M. F. Bari, S. R. Chowdhury, R. Ahmed, and R. Boutaba, “Policycop: an autonomic qos policy enforcement framework for software defined networks,†in Future Networks and Services (SDN4FNS), 2013 IEEE SDN for. IEEE, 2013, pp. 1–7.

Mamadou Alpha Barry, James K. Tamgno, Claude Lishou, Modou Bamba Cissé, “QoS Impact on Multimedia Traffic Load (IPTV, RoIP, VoIP) in Best Effort Modeâ€, International Conference on Advanced Communications Technology(ICACT), 2018

Ahmed Fawzy Gad, “Comparison of Signaling and Media Approaches to Detect VoIP SPIT Attackâ€, IEEE, 2018

Mario A. Ramirez-Reyna, S. Lirio Castellanos-Lopez, Mario E. Rivero-Angeles, “Connection Admission Control Strategy for Wireless VoIP Networks Using Different Codecs and/or Codec Mode-setsâ€, The 20th International Symposium on Wireless Personal Multimedia Communications (WPMC2017)

Murizah Kassim, Ruhani Ab. Rahman, Mohamad Azrai A.Aziz, Azlina Idris, Mat Ikram Yusof, “Performance Analysis of VoIP over 3G and 4G LTE Networkâ€, IEEE, 2017

Jan Holu, Michael Wallbaumy, Noah Smithy and Hakob Avetisyan, “Analysis of the Dependency of Call Duration on the Quality of VoIP Callsâ€, IEEE, 2018

Eko Ramadhan, Ahmad Firdausi,3Setiyo Budiyanto, “Design and Analysis QoS VoIP using Routing Border Gateway Protocol (BGP)â€, IEEE, 2017