World Journal of Engineering Research and Technology (WJERT) has indexed with various reputed international bodies like : Google Scholar , Index Copernicus , Indian Science Publications , SOCOLAR, China , International Institute of Organized Research (I2OR) , Cosmos Impact Factor , Research Bible, Fuchu, Tokyo. JAPAN , Scientific Indexing Services (SIS) , Jour Informatics (Under Process) , UDLedge Science Citation Index , International Impact Factor Services , International Scientific Indexing, UAE , International Society for Research Activity (ISRA) Journal Impact Factor (JIF) , International Innovative Journal Impact Factor (IIJIF) , Science Library Index, Dubai, United Arab Emirates , Scientific Journal Impact Factor (SJIF) , Science Library Index, Dubai, United Arab Emirates , Eurasian Scientific Journal Index (ESJI) , Global Impact Factor (0.342) , IFSIJ Measure of Journal Quality , Web of Science Group (Under Process) , Directory of Research Journals Indexing , Scholar Article Journal Index (SAJI) , International Scientific Indexing ( ISI ) , Scope Database , Academia , 

World Journal of Engineering Research and Technology

( An ISO 9001:2015 Certified International Journal )

An International Peer Reviewed Journal for Engineering Research and Technology

An Official Publication of Society for Advance Healthcare Research (Reg. No. : 01/01/01/31674/16)

ISSN 2454-695X

Impact Factor : 7.029

ICV : 79.45

News & Updation

  • Article Invited for Publication

    Article are invited for publication in WJERT Coming Issue

  • ICV

    WJERT Rank with Index Copernicus Value 79.45 due to high reputation at International Level

  • New Issue Published

    Its Our pleasure to inform you that, WJERT March 2024 Issue has been Published, Kindly check it on https://www.wjert.org/home/current_issues

  • WJERT New Impact Factor

    WJERT Impact Factor has been Increased to 7.029 for Year 2024.

  • WJERT: MARCH ISSUE PUBLISHED

    March 2024 Issue has been successfully launched on 1 March 2024.

Indexing

Abstract

INTERUSION DETECTION SYSTEM USING DATA MINING

*Dr. Devinder Singh and Anjali Pathania

ABSTRACT

In this paper we have presented a hybrid model for IDS using ANN and data mining approaches. it is important to deploy a hybrid network using ANN based and data mining-based IDS systems that can enable the system in making decisions on intrusion in a mobile environment. MANET is an infrastructure-less ad-hoc network. It is a collection of mobile nodes that are connected in an arbitrary and dynamic manner. ANN (Artificial Neural Network) is a type of Machine Learning scientific and statistical model that is used by computer systems in order to perform a task without involvement of explicit intrusion, rather than relying on interference and patterns instead. As there is node mobility that can impose different security issues, MANET’s are found more susceptible in security provision. In order to resolve this security issue, some authentication and encryption techniques can be proposed for the first-line defense in order to mitigate the security risks. However, complete eradication of these types of risks is next to impossible. For the Second line defense, the necessity of an Intrusion Detection System (IDS) is essential in this case. IDS can be referred as a method tool or resource that can help to detect access and warn for any activity of unapproved or unauthorized network activity. The current research has been done to prevent the network from the intruders. The number of attackers has been increased in the network because of more usage of technology and wireless network. Data is not allowed by the attackers to transmit successfully from source node to destination node. These intruders want to steal data and let to the unsuccessful transmission. In this research we are deploying 48 to 66 nodes in a defined communication area of 1000*1000 height and width. While starting the transmission source node and destination node is defined. After that while using IDS and AODV protocol route is created between destination and source node. If network decreases its performance will need to apply cuckoo search as an optimization algorithm. Cuckoo search algorithm extracts the properties and observe the energy been consumed by each node. Optimized properties provided as an input to the decision tree classifier with the help of this, system is being prepared according to their properties. If there will be a chance for existence of intruder in the network then it will be classified using decision tree algorithm.

[Full Text Article] [Download Certificate]