INTRUSION DETECTION SYSTEM USING CLASSIFICATION APPROACH IN DATA MINING
Main Article Content
Abstract
Data on a networkcomprises of interrelated units. As an illustration, web pages on the World Wide Web are connected by hyperlinks and research papers are associated by references also phone accounts are linked by calls, and conceivable terrorists are linked by communications. Networks have turned out to be pervasive. Correspondence networks, financial transaction networks, networks portraying physical systems, and social networks are all ending up noticeably progressively important in our everyday life. Regularly, we are interested in models of how nodes in the system influence each other (for example, who taints whom in an epidemiological system), models for predicting an attribute of intrigue in light of observed attributes of objects in the system. The technique of SVM is applied which will classify the data into malicious and non-malicious.
Â
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
D. Rodrigues, E. Cerqueira, and E. Monteiro, “QoE Assessment of VoIP in Next Generation Networks,†MMNS 2009, LNCS 5842, International Federation for Information Processing, pp. 94-105, 2009.
James Yu, Imad Al Ajarmeh, “Design and Traffic Engineering of VoIP for Enterprise and Carrier Networksâ€, International Journal on Advances in Telecommunications, vol. 1, No. 1, 2008.
O. Hersent, J.P. Petit, and D. Gurle, “Beyond VoIP Protocols. Understanding Voice Technology and Networking Techniques for IP Telephony,†John Wiley & Sons Ltd, 2005.
C. Olariu, J. Fitzpatrick, P. Perry, and L. Murphy, “A QoS based call admission control and resource allocation mechanism for LTE femtocell deployment,†in Consumer Communications and Networking Conference (CCNC), 2012 IEEE. IEEE, 2012, pp. 884–888.
M. Afaq, S. U. Rehman, and W. C. Song, “Visualization of elephant flows and qos provisioning in sdn-based networks,†in Network Operations and Management Symposium (APNOMS), 2015 17th Asia-Pacific, Aug 2015, pp. 444–447.
C. Xu, B. Chen, and H. Qian, “Quality of service guaranteed resource management dynamically in software defined network,†Journal of Communications, vol. 10, no. 11, 2015.
M. F. Bari, S. R. Chowdhury, R. Ahmed, and R. Boutaba, “Policycop: an autonomic qos policy enforcement framework for software defined networks,†in Future Networks and Services (SDN4FNS), 2013 IEEE SDN for. IEEE, 2013, pp. 1–7.
Mamadou Alpha Barry, James K. Tamgno, Claude Lishou, Modou Bamba Cissé, “QoS Impact on Multimedia Traffic Load (IPTV, RoIP, VoIP) in Best Effort Modeâ€, International Conference on Advanced Communications Technology(ICACT), 2018
Ahmed Fawzy Gad, “Comparison of Signaling and Media Approaches to Detect VoIP SPIT Attackâ€, IEEE, 2018
Mario A. Ramirez-Reyna, S. Lirio Castellanos-Lopez, Mario E. Rivero-Angeles, “Connection Admission Control Strategy for Wireless VoIP Networks Using Different Codecs and/or Codec Mode-setsâ€, The 20th International Symposium on Wireless Personal Multimedia Communications (WPMC2017)
Murizah Kassim, Ruhani Ab. Rahman, Mohamad Azrai A.Aziz, Azlina Idris, Mat Ikram Yusof, “Performance Analysis of VoIP over 3G and 4G LTE Networkâ€, IEEE, 2017
Jan Holu, Michael Wallbaumy, Noah Smithy and Hakob Avetisyan, “Analysis of the Dependency of Call Duration on the Quality of VoIP Callsâ€, IEEE, 2018
Eko Ramadhan, Ahmad Firdausi,3Setiyo Budiyanto, “Design and Analysis QoS VoIP using Routing Border Gateway Protocol (BGP)â€, IEEE, 2017