Work place: Department of Computer Science and Engineering, Manonmanium Sundaranar University, Tirunelveli, Tamilnadu, India
E-mail: rs_rajesh@yahoo.co.in
Website:
Research Interests: Applied computer science, Computational Science and Engineering, Computational Engineering, Computer systems and computational processes, Theoretical Computer Science, Data Structures and Algorithms, Engineering
Biography
Dr. R. S Rajesh received his B.E and M.E degrees in Electronics and Communication Engineering
from Madurai Kamaraj University, Madurai, India in the year 1988 and 1989 respectively,
and completed his Ph.D in Computer Science and Engineering from Manonmaniam Sundaranar University in the year 2004. In September 1992 he joined in Manonmaniam Sundaranar University where he is currently working as Reader in the Computer Science and Engineering Department.
By S.Selvakani Kandeeban R.S.Rajesh
DOI: https://doi.org/10.5815/ijmecs.2012.01.03, Pub. Date: 8 Jan. 2012
The process of monitoring the events that occur in a computer system or network and analyzing them for signs of intrusion is known as Intrusion Detection System (IDS). Detection ability of most of the IDS are limited to known attack patterns; hence new signatures for novel attacks can be troublesome, time consuming and has high false alarm rate. To achieve this, system was trained and tested with known and unknown patterns with the help of Radial Basis Functions (RBF). KDD 99 IDE (Knowledge Discovery in Databases Intrusion Detection Evaluation) data set was used for training and testing. The IDS is supposed to distinguish normal traffic from intrusions and to classify them into four classes: DoS, probe, R2L and U2R. The dataset is quite unbalanced, with 79% of the traffic belonging to the DoS category, 19% is normal traffic and less than 2% constitute the other three categories. The usefulness of the data set used for experimental evaluation has been demonstrated. The different metrics available for the evaluation of IDS were also introduced. Experimental evaluations were shown that the proposed methods were having the capacity of detecting a significant percentage of rate and new attacks.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals