A survey of IDS classification using KDD CUP 99 dataset & WEKA [ ]


Intrusion detection systems (IDSs) are based on two fundamental approaches first the recognition of anomalous activities as it turns from usual behavior and second misuse detection by observing those "signatures" of those recognized malicious assaults and classification vulnerabilities. Anomaly (behavior-based) IDSs presume the difference of normal behavior beneath attacks and achieve abnormal recognition evaluated with predefined system or user behavior reference model.