Tracking of Intruder in Local Area Network Using Decision Tree Learning Algorithms
Keywords:Intrusion Detection System, Iterative Dichotomiser 3, Information Gain, Entropy, Decision Tree Algorithm
This paper is mainly deals with Intrusion Detection System which is used to monitor the activities in network or an application and also used to track and filter the unauthorized data using Decision Tree and Entropy techniques. Entropy and information Gain are the two Mathematical Concept and Computational techniques, to find the Solution for particular dataset using ID3(Iterative Dichotomiser 3) Techniques. Entropy is mainly focused on Iterative steps base on three rules less than, greater than and equal to whereas Information Gain is used the leaf node from the decision tree. This paper is to track and filter the unauthorized data using Intrusion Detection System (IDS) in appropriate LAN network in an organization.
Dr. S.Vijayarani1 and Ms. Maria Sylviaa.S,â€ Intrusion Detection System-A Studyâ€, International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 4, No 1, February 2015.
Singh Vijendra, Hemjyotsana Parashar and Nisha Vasudeva,â€ A New Method for Classification of Datasets for Data Miningâ€, 3rd International Conference on Machine Learning and Computing V5, pp 551-554, 2011.
Shilpi Gupta, Roopal Mamtora, â€œIntrusion Detection System Using Wiresharkâ€, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 11, November 2012.
Ankita Agarwal, Sherish Johri, Ankur Agarwal, Vikas Tyagi, Atul Kumar, â€œMulti Agent Based Approach For Network Intrusion Detection Using Data Mining Conceptâ€, Journal of Global Research in Computer Science, Volume 3, No. 3, March 2012.
Subaira.A.S, Anitha.P,â€ A Survey: Network Intrusion Detection System based on Data Mining Techniquesâ€œ International Journal of Computer Science and Mobile Computing Vol.2 Issue. 10, pg. 145-153, October- 2013
Archana D Wankhade, Dr P.N.Chatur,â€ Comparison of Firewall and Intrusion Detection Systemâ€, International Journal of Computer Science and Information Technologies, Vol. 5 (1) 674-678, 2014.
Dr S. Vijayarani and Ms Maria Sylviaa S, â€œIntrusion Detection System â€“A Studyâ€, International Journal of Security, Privacy and Trust Management, Vol. No. $, Issue. No. 1, February 2015.
How to Cite
- Papers must be submitted on the understanding that they have not been published elsewhere (except in the form of an abstract or as part of a published lecture, review, or thesis) and are not currently under consideration by another journal published by any other publisher.
- It is also the authors responsibility to ensure that the articles emanating from a particular source are submitted with the necessary approval.
- The authors warrant that the paper is original and that he/she is the author of the paper, except for material that is clearly identified as to its original source, with permission notices from the copyright owners where required.
- The authors ensure that all the references carefully and they are accurate in the text as well as in the list of references (and vice versa).
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Attribution-NonCommercial 4.0 International that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
- The journal/publisher is not responsible for subsequent uses of the work. It is the author's responsibility to bring an infringement action if so desired by the author.