Combination of Data Mining Techniques for Intrusion Detection System

被引:0
作者
Elekar, Kailas Shivshankar [1 ]
机构
[1] Natl Informat Ctr, SDU, Pune, Maharashtra, India
来源
2015 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONTROL (IC4) | 2015年
关键词
Data Mining; Intrusion Detection System; J48; Random Forest; Random Tree;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As Internet continues to influence our day to day activities like eCommerce, eGoverence, eEducation etc. the threat from hackers has also increased. Due to which many researcher thinking intrusion detection systems as fundamental line of defense. However, many commercially available intrusion detection systems are predominantly signature-based that are designed to detect known attacks. These systems require frequent updates of signature or rules and they are not capable of detecting unknown attacks. One of the solution is use of anomaly base intrusion detection systems which are extremely effective in detecting known as well as unknown attacks. One of the major problem with anomaly base intrusion detection systems is detection of high false alarm rate. In this paper, we provide solution to increase attack detection rate while minimizing high false alarm rate by combining various data mining techniques.
引用
收藏
页数:5
相关论文
共 50 条
[41]   Design of data mining-based intrusion detection system [J].
Su, MD ;
Liu, DQ ;
Li, YF .
ICEMI 2005: Conference Proceedings of the Seventh International Conference on Electronic Measurement & Instruments, Vol 2, 2005, :93-95
[42]   Data Mining for Network Intrusion Detection System in Real Time [J].
Peng, Tao ;
Zuo, Wanli .
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (2B) :173-177
[43]   Network intrusion detection based on system calls and data mining [J].
Tian, Xinguang ;
Cheng, Xueqi ;
Duan, Miyi ;
Liao, Rui ;
Chen, Hong ;
Chen, Xiaojuan .
FRONTIERS OF COMPUTER SCIENCE IN CHINA, 2010, 4 (04) :522-528
[44]   Hybrid intrusion detection method to increase anomaly detection by using data mining techniques [J].
Ahmad B. ;
Jian W. ;
Hassan B. .
International Journal of Database Theory and Application, 2016, 9 (12) :231-240
[45]   Network intrusion detection based on system calls and data mining [J].
Xinguang Tian ;
Xueqi Cheng ;
Miyi Duan ;
Rui Liao ;
Hong Chen ;
Xiaojuan Chen .
Frontiers of Computer Science in China, 2010, 4 :522-528
[46]   Anomaly Intrusion Detection Based Upon Data Mining Techniques and Fuzzy Logic [J].
Yu, Yingbing ;
Wu, Han .
PROCEEDINGS 2012 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2012, :514-517
[47]   Data Mining and Intrusion Detection Systems [J].
Dewa, Zibusiso ;
Maglaras, Leandros A. .
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (01) :62-71
[48]   Intrusion Detection Based on Data Mining [J].
Oreku, George S. ;
Mtenzi, Fredrick J. .
EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, :696-701
[49]   A Study of Intrusion Detection in Data Mining [J].
Reddy, E. Kesavalu ;
Reddy, V. Naveen ;
Rajulu, P. Govinda .
WORLD CONGRESS ON ENGINEERING, WCE 2011, VOL III, 2011, :1889-1894
[50]   Study of data mining in intrusion detection [J].
Zhou, Quan ;
Zhao, Feng-Ying ;
Wang, Chong-Jun ;
Chen, Shi-Fu .
Moshi Shibie yu Rengong Zhineng/Pattern Recognition and Artificial Intelligence, 2008, 21 (04) :520-526