{ "access": { "embargo": { "active": false, "reason": null }, "files": "public", "record": "public", "status": "open" }, "created": "2022-01-11T09:39:33.244942+00:00", "custom_fields": { "journal:journal": { "issue": "2", "pages": "96-102", "title": "International Journal of Innovative Technology and Exploring Engineering (IJITEE)", "volume": "10" }, "legacy:subjects": [ { "identifier": "2278-3075", "scheme": "issn", "term": "ISSN" }, { "identifier": "100.1/ijitee.B82781210220", "scheme": "handle", "term": "Retrieval Number" } ] }, "deletion_status": { "is_deleted": false, "status": "P" }, "files": { "count": 1, "enabled": true, "entries": { "B82781210220.pdf": { "checksum": "md5:aede3c5c1fe5d493e15bae62d3d753c4", "ext": "pdf", "id": "f6013c55-4b51-4df6-9ae7-067ec892b2e1", "key": "B82781210220.pdf", "metadata": null, "mimetype": "application/pdf", "size": 390165 } }, "order": [], "total_bytes": 390165 }, "id": "5836480", "is_draft": false, "is_published": true, "links": { "access": "https://zenodo.org/api/records/5836480/access", "access_links": "https://zenodo.org/api/records/5836480/access/links", "access_request": "https://zenodo.org/api/records/5836480/access/request", "access_users": "https://zenodo.org/api/records/5836480/access/users", "archive": "https://zenodo.org/api/records/5836480/files-archive", "archive_media": "https://zenodo.org/api/records/5836480/media-files-archive", "communities": "https://zenodo.org/api/records/5836480/communities", "communities-suggestions": "https://zenodo.org/api/records/5836480/communities-suggestions", "doi": "https://doi.org/10.35940/ijitee.B8278.1210220", "draft": "https://zenodo.org/api/records/5836480/draft", "files": "https://zenodo.org/api/records/5836480/files", "latest": "https://zenodo.org/api/records/5836480/versions/latest", "latest_html": "https://zenodo.org/records/5836480/latest", "media_files": "https://zenodo.org/api/records/5836480/media-files", "parent": "https://zenodo.org/api/records/5836479", "parent_doi": "https://zenodo.org/doi/", "parent_html": "https://zenodo.org/records/5836479", "requests": "https://zenodo.org/api/records/5836480/requests", "reserve_doi": "https://zenodo.org/api/records/5836480/draft/pids/doi", "self": "https://zenodo.org/api/records/5836480", "self_doi": "https://zenodo.org/doi/10.35940/ijitee.B8278.1210220", "self_html": "https://zenodo.org/records/5836480", "self_iiif_manifest": "https://zenodo.org/api/iiif/record:5836480/manifest", "self_iiif_sequence": "https://zenodo.org/api/iiif/record:5836480/sequence/default", "versions": "https://zenodo.org/api/records/5836480/versions" }, "media_files": { "count": 0, "enabled": false, "entries": {}, "order": [], "total_bytes": 0 }, "metadata": { "contributors": [ { "affiliations": [ { "name": "Publisher" } ], "person_or_org": { "family_name": "Blue Eyes Intelligence Engineering and Sciences Publication(BEIESP)", "name": "Blue Eyes Intelligence Engineering and Sciences Publication(BEIESP)", "type": "personal" }, "role": { "id": "sponsor", "title": { "de": "Sponsor", "en": "Sponsor" } } } ], "creators": [ { "affiliations": [ { "name": "Assistant Professor, Manipal University Jaipur, Rajasthan, India." } ], "person_or_org": { "family_name": "Neha Sharma", "name": "Neha Sharma", "type": "personal" } }, { "affiliations": [ { "name": "B.Tech, Information Technology, Manipal University Jaipur, Rajasthan, India." } ], "person_or_org": { "family_name": "Harsh Vardhan Bhandari", "name": "Harsh Vardhan Bhandari", "type": "personal" } }, { "affiliations": [ { "name": "Assistant Professor, Manipal University Jaipur, Rajasthan, India." } ], "person_or_org": { "family_name": "Narendra Singh Yadav", "name": "Narendra Singh Yadav", "type": "personal" } }, { "affiliations": [ { "name": "B.Tech, Information Technology, Manipal University Jaipur, Rajasthan, India." } ], "person_or_org": { "family_name": "Harsh Vardhan Jonathan Shroff", "name": "Harsh Vardhan Jonathan Shroff", "type": "personal" } } ], "description": "
Nowadays it is imperative to maintain a high level of security to ensure secure communication of information between various institutions and organizations. With the growing use of internet over the years, the number of attacks over the internet have escalated. A powerful Intrusion Detection System (IDS) is required to ensure the security of a network. The aim of an IDS is to monitor the active processes in a network and to detect any deviation from the normal behavior of the system. When it comes to machine learning, optimization is the process of obtaining the maximum accuracy from a model. Optimization is vital for IDSs in order to predict a wide variety of attacks with utmost accuracy. The effectiveness of an IDS is dependent on its ability to correctly predict and classify any anomaly faced by a computer system. During the last two decades, KDD_CUP_99 has been the most widely used data set to evaluate the performance of such systems. In this study, we will apply different Machine Learning techniques on this data set and see which technique yields the best results.
", "languages": [ { "id": "eng", "title": { "en": "English" } } ], "publication_date": "2020-12-30", "publisher": "Zenodo", "related_identifiers": [ { "identifier": "2278-3075", "relation_type": { "id": "iscitedby", "title": { "de": "Wird zitiert von", "en": "Is cited by" } }, "resource_type": { "id": "publication-article", "title": { "de": "Zeitschriftenartikel", "en": "Journal article" } }, "scheme": "issn" } ], "resource_type": { "id": "publication-article", "title": { "de": "Zeitschriftenartikel", "en": "Journal article" } }, "rights": [ { "description": { "en": "The Creative Commons Attribution license allows re-distribution and re-use of a licensed work on the condition that the creator is appropriately credited." }, "icon": "cc-by-icon", "id": "cc-by-4.0", "props": { "scheme": "spdx", "url": "https://creativecommons.org/licenses/by/4.0/legalcode" }, "title": { "en": "Creative Commons Attribution 4.0 International" } } ], "subjects": [ { "subject": "Intrusion detection systems, KDDCUP99, Machine Learning, Classification." } ], "title": "Optimization of IDS using Filter-Based Feature Selection and Machine Learning Algorithms" }, "parent": { "access": { "owned_by": { "user": 282476 } }, "communities": {}, "id": "5836479", "pids": {} }, "pids": { "doi": { "identifier": "10.35940/ijitee.B8278.1210220", "provider": "external" }, "oai": { "identifier": "oai:zenodo.org:5836480", "provider": "oai" } }, "revision_id": 2, "stats": { "all_versions": { "data_volume": 21849240.0, "downloads": 56, "unique_downloads": 52, "unique_views": 110, "views": 118 }, "this_version": { "data_volume": 21459075.0, "downloads": 55, "unique_downloads": 51, "unique_views": 109, "views": 117 } }, "status": "published", "updated": "2022-01-11T13:48:51.547751+00:00", "versions": { "index": 1, "is_latest": true } }