UbuntuNet-Connect 2016 Conference Papers and Presentations
Permanent URI for this collection
Browse
Browsing UbuntuNet-Connect 2016 Conference Papers and Presentations by Subject "Classical Artificial Intelligence (AI)"
Now showing 1 - 1 of 1
Results Per Page
Sort Options
Item A Technical Evaluation of the Performance of Classical Artificial Intelligence (AI) and Methods Based on Computational Intelligence (CI) i.e Supervised Learning, Unsupervised Learning And Ensemble Algorithms in Intrusion Detection Systems(2016-11) Zvarevashe, Kudakwashe; Mapanga, Innocent; Kadebu, PrudenceThe emergence of new technologies in this dynamic information era has caused a tremendous increase in the rate at which data is being generated through interactive applications thereby increasing the movement of information and data on communication networks as individuals, organizations and business interact on a daily basis. Big Data is flooding our networks and storage devices stimulating a cause for concern in terms of processing, storage, access and security of large blocks of data in most networks. The facilitation of online research services is always under the risk of intruders and malicious activity. Most techniques used in today's Intrusion Detection Systems are not able to deal with the dynamic and complex nature of cyber-attacks on computer networks. Over the years, Intrusion Detection Systems .Various methods have been developed by many researchers to detect intrusions aimed at networks as well as standalone devices which are based on machine learning algorithms, neural networks, statistical methods etc. In this paper, we study several such schemes and compare their performance. The experiments are done using WEKA (Waikato Environment for Knowledge Analysis) and one of the most popular Intrusion Detection Systems datasets which is NSL-KDD99 so as to analyse the consistency of each algorithm. We divide the schemes into methods based on classical artificial intelligence (AI) and methods based on computational intelligence (CI) i.e supervised learning, unsupervised learning, ensemble and immune algorithms. We explain how various characteristics of CI techniques can be used to build efficient IDS. This paper will further evaluate the performance of the algorithms using the following parameters: accuracy, detection rate and false alarm.