EconPapers    
Economics at your fingertips  
 

A novel mutual feature CRF for intrusion detection system

Jinny S. Vinila and J. Jayakumari

International Journal of Enterprise Network Management, 2015, vol. 6, issue 4, 299-311

Abstract: Intrusion detection system (IDS) is a system that monitors the network to find out the suspicious activity there by stopping the disruption that can be caused by intruders. Disruption caused by intruders can be stopped by having effective IDS. Intrusion detection system has three works, i.e., it continuously monitors network, compares with knowledge base and gives alarm to the administrator. The effectiveness of the system resides on the knowledge base. Preparing knowledge base is the most required part. This can be simply thought as a data analysis system. Data mining algorithms are applied to develop the knowledge base. Mining algorithm alone will not produce best knowledge base and so an additional step is required to sharp the algorithm. In this paper, we propose a mutual information feature selection algorithm with conditional random field, which produces high performance, less false positive IDS.

Keywords: conditional random field; feature selection; data mining; intrusion detection systems; IDS; information gain; mutual feature CRF; network security. (search for similar items in EconPapers)
Date: 2015
References: Add references at CitEc
Citations:

Downloads: (external link)
http://www.inderscience.com/link.php?id=73873 (text/html)
Access to full text is restricted to subscribers.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:ids:ijenma:v:6:y:2015:i:4:p:299-311

Access Statistics for this article

More articles in International Journal of Enterprise Network Management from Inderscience Enterprises Ltd
Bibliographic data for series maintained by Sarah Parker ().

 
Page updated 2025-03-19
Handle: RePEc:ids:ijenma:v:6:y:2015:i:4:p:299-311