<doi_batch xmlns="http://www.crossref.org/schema/4.4.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" version="4.4.0"><head><doi_batch_id>cd6849cc-90d3-4f48-9224-e99d3b124bc5</doi_batch_id><timestamp>20220310042919099</timestamp><depositor><depositor_name>naun:naun</depositor_name><email_address>mdt@crossref.org</email_address></depositor><registrant>MDT Deposit</registrant></head><body><journal><journal_metadata language="en"><full_title>International Journal of Systems Applications, Engineering &amp; Development</full_title><issn media_type="electronic">2074-1308</issn><archive_locations><archive name="Portico"/></archive_locations><doi_data><doi>10.46300/91015</doi><resource>http://www.naun.org/cms.action?id=3100</resource></doi_data></journal_metadata><journal_issue><publication_date media_type="online"><month>1</month><day>11</day><year>2022</year></publication_date><publication_date media_type="print"><month>1</month><day>11</day><year>2022</year></publication_date><journal_volume><volume>16</volume><doi_data><doi>10.46300/91015.2022.16</doi><resource>https://npublications.com/journals/saed/2022.php</resource></doi_data></journal_volume></journal_issue><journal_article language="en"><titles><title>Statistical Analysis of Different Artificial Intelligent Techniques applied to Intrusion Detection System</title></titles><contributors><person_name sequence="first" contributor_role="author"><given_name>Hind</given_name><surname>Tribak</surname><affiliation>University of Granada, Spain</affiliation></person_name><person_name sequence="additional" contributor_role="author"><given_name>Olga</given_name><surname>Valenzuela</surname><affiliation>University of Granada, Spain</affiliation></person_name><person_name sequence="additional" contributor_role="author"><given_name>Fernando</given_name><surname>Rojas</surname><affiliation>University of Granada, Spain</affiliation></person_name><person_name sequence="additional" contributor_role="author"><given_name>Ignacio</given_name><surname>Rojas</surname><affiliation>University of Granada, Spain</affiliation></person_name></contributors><jats:abstract xmlns:jats="http://www.ncbi.nlm.nih.gov/JATS1"><jats:p>Intrusion detection is the act of detecting unwanted traffic on a network or a device. Several types of Intrusion Detection Systems (IDS) technologies exist due to the variance of network configurations. Each type has advantages and disadvantage in detection, configuration, and cost. In general, the traditional IDS relies on the extensive knowledge of security experts, in particular, on their familiarity with the computer system to be protected. To reduce this dependence, various datamining and machine learning techniques have been used in the literature. The experiments and evaluations of the proposed intrusion detection system are performed with the NSL-KDD intrusion detection dataset. We will apply different learning algorithms on NSL-KDD data set, to recognize between normal and attack connections and compare their performing in different scenariosdiscretization, features selections and algorithm method for classification- using a powerful statistical analysis: ANOVA. In this study, both the accuracy of the configuration of different system and methodologies used, and also the computational time and complexity of the methodologies are analyzed.</jats:p></jats:abstract><publication_date media_type="online"><month>3</month><day>10</day><year>2022</year></publication_date><publication_date media_type="print"><month>3</month><day>10</day><year>2022</year></publication_date><pages><first_page>48</first_page><last_page>55</last_page></pages><publisher_item><item_number item_number_type="article_number">10</item_number></publisher_item><ai:program xmlns:ai="http://www.crossref.org/AccessIndicators.xsd" name="AccessIndicators"><ai:free_to_read start_date="2022-03-10"/><ai:license_ref applies_to="am" start_date="2022-03-10">https://npublications.com/journals/saed/2022/a202014-010(2022).pdf</ai:license_ref></ai:program><archive_locations><archive name="Portico"/></archive_locations><doi_data><doi>10.46300/91015.2022.16.10</doi><resource>https://npublications.com/journals/saed/2022/a202014-010(2022).pdf</resource></doi_data><citation_list><citation key="ref0"><doi>10.1109/icde.2004.1320103</doi><unstructured_citation>Jian Pei, Shambhu J. Upadhyaya. Faisal Farooq, Venugopal Govindaraju “Data mining for intrusion detection: techniques applications and systems “ In Proceedings of the 20th International Conference on Data Engineering, pp: 877 - 87, 2004 </unstructured_citation></citation><citation key="ref1"><unstructured_citation>Dash, M., Liu, H., 1997. Feature selection for classification. Int. J. Intell. Data Anal., 1:131-156. </unstructured_citation></citation><citation key="ref2"><unstructured_citation>Hall, M. A. &amp; Smith, L. A. Feature Selection for Machine Learning: Comparing a Correlation-Based Filter Approach to the Wrapper in `Proceedings of the Twelfth International Florida Artificial Intelligence Research Society Conference, Orlando, USA' pp. 235-239. 1999 </unstructured_citation></citation><citation key="ref3"><unstructured_citation>H. Liu and R. Setiono. A probabilistic approach to feature selection: A filter solution. In Proceedings of the 13th International Conference on Machine Learning, pp 319–327. Morgan Kaufmann, 1996. </unstructured_citation></citation><citation key="ref4"><unstructured_citation>U.M. Fayyad and K.B. Irani. Multi-interval discretization of continuous valued attributes for classification learning. In Proceedings of the 13th International Joint Conference on Artificial Intelligence, pp 1022-1027, Morgan Kaufmann, 1993. </unstructured_citation></citation><citation key="ref5"><doi>10.1002/(sici)1098-111x(200001)15:1&lt;61::aid-int4&gt;3.0.co;2-o</doi><unstructured_citation>Ellis J. Clarke, Bruce A. Barton,“Entropy and MDL Discretization of Continuous Variables for Bayesian Belief Networks” International Journal Of Intelligent Systems, VOL. 15, 61]92 _2000. </unstructured_citation></citation><citation key="ref6"><unstructured_citation>W. Frawley and G. Piatetsky-Shapiro and C. Matheus, Knowledge Discovery in Databases: An Overview. AI Magazine, Fall 1992, pgs 213-228. </unstructured_citation></citation><citation key="ref7"><unstructured_citation>Jerne, N. K. (1974). Towards a Network Theory of the Immune System, Ann. Immunol. (Inst. Pasteur) 125C, 373 – 389 </unstructured_citation></citation><citation key="ref8"><doi>10.1109/cec.2002.1007011</doi><unstructured_citation>L. Ñ unes de Castro and J. Timmis. An artificial immune network for multimodal function optimization. In Proccedings of the 2002 Congress on Evolutionary Computation (CEC’2002), volume 1, pp 669–674, Honolulu, Hawaii, May 2002. </unstructured_citation></citation><citation key="ref9"><unstructured_citation>Hammerstrom, D., 1993. Neural networks at work, IEEE Spectrum, June, 26–32 </unstructured_citation></citation><citation key="ref10"><unstructured_citation>Vapnik, V. N. The Nature of Statistical Learning Theory. Springer. 1995 </unstructured_citation></citation><citation key="ref11"><unstructured_citation>Software available at http://www.csie.ntu.edu.tw/_cjlin/libsvm. </unstructured_citation></citation><citation key="ref12"><doi>10.1007/s10618-009-0131-8</doi><unstructured_citation>Jens Christian Hühn and Eyke Hüllermeier. Furia: an algorithm for unordered fuzzy rule induction. Data Mining and Knowledge Discovery, 19(3):293–319, 2009. </unstructured_citation></citation><citation key="ref13"><unstructured_citation>Quinlan J. C4.5: Programs for machine learning, Morgan Kaufmann Pub., 1993 (ISBN: 1558602380). </unstructured_citation></citation><citation key="ref14"><unstructured_citation>Leo Breiman. Random forests. Machine Learning Journal, 45:5–32, 2001 </unstructured_citation></citation><citation key="ref15"><unstructured_citation>L. Breiman, J. Friedman, R. Olshen, and C. Stone. Classification and regresion trees. Wadsworth Int. Group, Belmont, CA, 1984. </unstructured_citation></citation><citation key="ref16"><unstructured_citation>R. Kohavi. Scaling up the accuracy of naive-Bayes classifiers: a decision-tree hybrid. In Proceedings of the 2nd International Conference on Knowledge Discovery and Data Mining, pp 202-207, 1996. </unstructured_citation></citation><citation key="ref17"><doi>10.1016/b978-1-55860-377-6.50023-2</doi><unstructured_citation>William W. Cohen. Fast effective rule induction. In In Proceedings of the Twelfth International Conference on Machine Learning, pp 115– 123. Morgan Kaufmann, 1995. </unstructured_citation></citation><citation key="ref18"><unstructured_citation>Frank, E. Y Witten, I.H. (1998): “Generating Accurate Rule Sets Without Global Optimization”, en J. SHAVLIK (ed.): Proceedings of the Fifteenth International Conference on Machine Learning, Madison, Wisconsin. Morgan Kaufmann, San Francisco, pp. 144-151 </unstructured_citation></citation><citation key="ref19"><doi>10.1037/e471672008-001</doi><unstructured_citation>E. Fix and J. Hodges. Discriminatory analysis, nonparametric discrimination consistency properties. Technical Report 4, US Air Force, School of Aviation Medicine, Randolph Field, TX, 1951 </unstructured_citation></citation><citation key="ref20"><doi>10.1109/tit.1967.1053964</doi><unstructured_citation>T. M. Cover and P. E. Hart. Nearest neighbor pattern classification. IEEE Transactions on Information Theory, IT-13(1):21–27, 1967 </unstructured_citation></citation><citation key="ref21"><doi>10.1364/ol.22.001648</doi><unstructured_citation>Friedman, J. S., C. A. Tepley, P. A. Castleberg, and H. Roe, Middleatmospheric Doppler lidar using an iodine-vapor edge filter, Optics Letters, 22, 1,648-1,650, 1997. </unstructured_citation></citation><citation key="ref22"><unstructured_citation>Baum, L. E. An inequality and associated maximizaton technique in statistical estimation for probabilistic functions of markov processes. Inequalities, 3:pp 1-8, 1972. </unstructured_citation></citation><citation key="ref23"><doi>10.1016/b978-0-08-051584-7.50027-9</doi><unstructured_citation>Rabiner, Lawrence R. A tutorial on hidden markov models and selected applications in speech recognition. pp 267-296, 1990. </unstructured_citation></citation><citation key="ref24"><doi>10.7717/peerj-cs.327/table-3</doi><unstructured_citation>NSL-KDD data base. http://www.iscx.ca/NSL-KDD/</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>