Network Intrusion Detection System Using Data Mining

被引:0
|
作者
Lima de Campos, Lidio Mauro [1 ]
Limao de Oliveira, Roberto Celio [1 ]
Roisenberg, Mauro [1 ]
机构
[1] Univ Fed Para UFPA, BR-68746360 Castanhal, PA, Brazil
来源
ENGINEERING APPLICATIONS OF NEURAL NETWORKS | 2012年 / 311卷
关键词
Datamining; Network Intrusion Detection System; Decision Tree; Neural Network; Bayesian Network; TAXONOMY;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The aim of this study is to simulate a network traffic analyzer that is part of an Intrusion Detection System - IDS, the main focus of research is data mining and for this type of application the steps that precede the data mining : data preparation (possibly involving cleaning data, data transformations, selecting subsets of records, data normalization) are considered fundamental for a good performance of the classifiers during the data mining stage. In this context, this paper discusses and presents as a contribution not only the classifiers that were used in the problem of intrusion detection, but also the initial stage of data preparation. Therefore, we tested the performance of three classifiers on the KDDCUP'99 benchmark intrusion detection dataset and selected the best classifiers. We initially tested a Decision Tree and a Neural Network using this dataset, suggesting improvements by reducing the number of attributes from 42 to 27 considering only two classes of detection, normal and intrusion. Finally, we tested the Decision Tree and Bayesian Network classifiers considering five classes of attack: Normal, DOS, U2R, R2L and Probing. The experimental results proved that the algorithms used achieved high detection rates (DR) and significant reduction of false positives (FP) for different types of network intrusions using limited computational resources.
引用
收藏
页码:104 / 113
页数:10
相关论文
共 50 条
  • [41] Data mining for intrusion detection
    Liu, DH
    Wang, HZ
    Wang, XM
    2001 INTERNATIONAL CONFERENCES ON INFO-TECH AND INFO-NET PROCEEDINGS, CONFERENCE A-G: INFO-TECH & INFO-NET: A KEY TO BETTER LIFE, 2001, : E7 - E12
  • [42] Classification of Intrusion Detection Using Data Mining Techniques
    Sahani, Roma
    Shatabdinalini
    Rout, Chinmayee
    Badajena, J. Chandrakanta
    Jena, Ajay Kumar
    Das, Himansu
    PROGRESS IN COMPUTING, ANALYTICS AND NETWORKING, ICCAN 2017, 2018, 710 : 753 - 764
  • [43] Efficient Classification Mechanism for Network Intrusion Detection System Based on Data Mining Techniques: a Survey
    Subaira, A. S.
    Scholar, P. G.
    Anitha, P.
    2014 IEEE 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO), 2014, : 274 - 280
  • [44] Review on Speedup and Accurate Intrusion Detection System by Using MSPSO and Data Mining Technology
    Umak, Mangesh R.
    Raghuwanshi, K. S.
    Mishra, Rachana
    2014 IEEE STUDENTS' CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER SCIENCE (SCEECS), 2014,
  • [45] Design of data mining-based intrusion detection system
    Su, MD
    Liu, DQ
    Li, YF
    ICEMI 2005: Conference Proceedings of the Seventh International Conference on Electronic Measurement & Instruments, Vol 2, 2005, : 93 - 95
  • [46] Research on Intrusion Detection System Model Based on Data Mining
    Zhu Limiao
    Huang Hua
    Zheng Hao
    2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 113 - 116
  • [47] Design of Intrusion Detection System Based on Data Mining Algorithm
    Song, Changxin
    Ma, Ke
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING SYSTEMS, 2009, : 370 - 373
  • [48] A novel adaptive intrusion detection system based on data mining
    Yu, ZX
    Chen, JR
    Zhu, TQ
    PROCEEDINGS OF 2005 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-9, 2005, : 2390 - 2395
  • [49] Research on Network Intrusion Detection Technology Based on Data Mining Technology
    Zhou, Lijun
    Lv, Hong
    Zhao, Yuan
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MECHATRONICS AND INDUSTRIAL INFORMATICS, 2015, 31 : 444 - 450
  • [50] Approach Research on the Techniques for Network Intrusion Detection Based on Data Mining
    Gong Lina
    Xu Tao
    Zhang Wei
    Li XuHong
    Wang Xia
    Pan Wenwen
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON APPLIED SCIENCE AND ENGINEERING INNOVATION, 2015, 12 : 2133 - 2136