Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

A Comprehensive Analysis and study in Intrusion Detection System using Data Mining Techniques

Print
PDF
International Journal of Computer Applications
© 2011 by IJCA Journal
Volume 35 - Number 8
Year of Publication: 2011
Authors:
G.V. Nadiammai
S. Krishnaveni
M. Hemalatha
10.5120/4425-6161

G V Nadiammai, S Krishnaveni and M Hemalatha. Article: A Comprehensive Analysis and study in Intrusion Detection System using Data Mining Techniques. International Journal of Computer Applications 35(8):51-56, December 2011. Full text available. BibTeX

@article{key:article,
	author = {G. V. Nadiammai and S. Krishnaveni and M. Hemalatha},
	title = {Article: A Comprehensive Analysis and study in Intrusion Detection System using Data Mining Techniques},
	journal = {International Journal of Computer Applications},
	year = {2011},
	volume = {35},
	number = {8},
	pages = {51-56},
	month = {December},
	note = {Full text available}
}

Abstract

Data mining refers to extracting knowledge from large amounts of data. Most of the current systems are weak at detecting attacks without generating false alarms. Intrusion detection systems (IDSs) are increasingly a key part of system defense. An intrusion can be defined as any set of actions that compromise the integrity, confidentiality or availability of a network resource(such as user accounts, file system, kernels & so on).Data mining plays a prominent role in data analysis. In this paper, classification techniques are used to predict the severity of attacks over the network. I have compared zero R classifier, Decision table classifier & Random Forest classifier with KDDCUP 99 databases from MIT Lincoln Laboratory.

References

  • Alan Bivens, Chandrika Palagiri, Rasheda Smith, Boleslaw Szymanski, ”Network-Based Intrusion Detection Using Neural Networks”, in Proceedings of the Intelligent Engineering Systems Through Artificial Neural Networks, St.Louis, ANNIE-2002, and Vol: 12, pp- 579-584, ASME Press, New York.
  • Aly Ei-Semary, Janica Edmonds, Jesus Gonzalez-Pino, Mauricio Papa, “Applying Data Mining of Fuzzy Association Rules to Network Intrusion Detection”, in the Proceedings of Workshop on Information Assurance United States Military Academy 2006, IEEE Communication Magazine, West Point, NY,DOI:10.1109/IAW.2006/652083.
  • Amir Azimi, Alasti, Ahrabi, Ahmad Habibizad Navin, Hadi Bahrbegi, “A New System for Clustering & Classification of Intrusion Detection System Alerts Using SOM”, International Journal of Computer Science & Security, Vol: 4, Issue: 6, pp-589-597, 2011.
  • Anderson.J.P, “Computer Security Threat Monitoring & Surveilance”, Technical Report, James P Anderson co., Fort Washington, Pennsylvania, 1980.
  • Data Mining:Concepts and Techniques, 2nd Edition , Jiawei Han and Kamber,Morgan kaufman Publishers, Elsevier Inc,2006.
  • Denning .D.E, ”An Intrusion Detection Model”, Transactions on Software Engineering, IEEE Communication Magazine, 1987,SE-13, PP-222-232,DOI:10.1109/TSE.1987.232894.
  • Dewan Md, Farid, Mohammed Zahidur Rahman, “Anomaly Network Intrusion Detection Based on Improved Self Adaptive Bayesian Algorithm”, Journal of Computers, Vol 5, pp-23-31, Jan 2010, DOI:10.4.304/jcp 5.1.
  • ZeroR avaialable at: http://en.Wikipedia.org/wiki/ZeroR
  • Decision tree, available at: http://en.Wikipedia.org/wiki/Decision_tree
  • Random Forest avaialable at: http://en.Wikipedia.org/wiki/Random_Forest
  • KDD Cup 1999 Data, available at: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
  • Jake Ryan, Meng - Jang Lin, Risto Miikkulainen, ”Intrusion Detection With Neural Networks”, Advances in Neural Information Processing System 10, Cambridge, MA:MIT Press,1998,DOI:10.1.1.31.3570.
  • Jian Pei, Upadhayaya.S.J, Farooq.F, Govindaraju.V,”Data Mining for Intrusion Detection: Techniques, Applications & Systems, in the Proceedings of 20th International Conference on Data Engineering, pp-877-887, 2004.
  • Jin-Ling Zhao, Jiu-fen Zhao ,Jian-Jun Li, “Intrusion Detection Based on Clustering Genetic Algorithm”, in Proceedings of International Conference on Machine Learning & Cybernetics (ICML),2005, IEEE Communication Magazine,ISBN:0-7803-9091-1,DOI: 10.1109/ICML.2005.1527621.
  • Macros .M. Campos, Boriana L. Milenora, “ Creation & Deployment of Data Mining based Intrusion Detection Systems in Oracle Db 10g”, in the proceedings of 4th International Conference on Machine Learning & Applications, 2005.
  • Mahbod Tavallaee, Ebrahim Bagheri, Wei Lu and Ali A. Ghorbani, "A detailed analysis of the KDD CUP 99 data set", in Proceedings of the Second IEEE international conference on Computational intelligence for security and defense applications, pp. 53-58, Ottawa, Ontario, Canada, 2009.
  • Norouzian.M.R, Merati.S, “Classifying Attacks in a Network Intrusion Detection System Based on Artificial Neural Networks”, in the Proceedings of 13th International Conference on Advanced Communication Technology(ICACT), 2011,ISBN:978-1-4244-8830-8,pp-868-873.
  • Oswais.S, Snasel.V, Kromer.P, Abraham. A, “Survey: Using Genetic Algorithm Approach in Intrusion Detection Systems Techniques”, in the Proceedings of 7th International Conference on Computer Information & Industrial Management Applications (CISIM), 2008, IEEE Communication Magazine,pp-300-307,ISBN:978-0-7695-318-7,DOI:10.1109/CISM.2008-49.
  • Sadiq Ali Khan, “Rule-Based Network Intrusion Detection Using Genetic Algorithm”, International Journal of Computer Applications, No: 8, Article: 6, 2011, DOI: 10.5120/2303-2914.
  • Sathyabama.S, Irfan Ahmed.M.S, Saravanan.A,”Network Intrusion Detection Using Clustering: A Data Mining Approach”, International Journal of Computer Application (0975-8887), Sep-2011, Vol: 30, No: 4, ISBN: 978-93-80864-87-5, DOI: 10.5120/3670-5071.
  • Sekeh.M.A,Bin Maarof.M.A, “Fuzzy Intrusion Detection System Via Data Mining with Sequence of System Calls”, in the Proceedings of International Conference on Information Assurance & security (IAS)2009,IEEE Communication Magazine, pp- 154-158,ISBN:978-0-7695-3744-3,DOI:10.1109/IAS.2009.32.
  • Shanmugavadivu .R, “Network Intrusion Detection System Using Fuzzy Logic”, Indian Journal of Computer Science & Engineering, and ISSN: 0976-5166, Vol: 2, No.1, pp- 101-110, 2011.
  • Shilendra Kumar, Shrivastava ,Preeti Jain, “Effective Anomaly Based Intrusion Detection Using Rough Set Theory & Support Vector Machine(0975-8887), Vol:18,No:3, March 2011,DOI: 10.5120/2261-2906.
  • Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham, “Intrusion Detection Using an Ensemble of Intelligent Paradigms”,Journal of Network & Computer Applications ,pp-1-15, 2004.
  • Taeshik Shon, Jong Sub Moon, “A Hybrid Machine Learning Approach to Network Anomaly Detection”, Information Sciences 2007, Vol: 177, Issue: 18, Publisher: USENIX Association, pp- 3799-3821, ISSN:00200255,DOI:10.1016/j.ins-2007.03.025.
  • Teng.H.S, Chen.K and Lu.S.C, “Adaptive Real-Time Anomaly Detection using Inductively Generated Sequential Patterns, in the Proceedings of Symposium on research in Computer Security & Privacy, IEEE Communication Magazine,1990, pp-278-284.
  • Vera Marinova-Boncheva, “A Short Survey of Intrusion Detection Systems”, Institute of Information Technologies, 1113 Sofia, pp-23-30, 2007.