Data Mining Based Advanced Algorithm for Intrusion Detections in Communication Networks

被引:3
|
作者
Bhosale, Karuna S. [1 ]
Nenova, Maria [1 ]
Iliev, Georgi [1 ]
机构
[1] Tech Univ Sofia, Fac Telecommun, Sofia, Bulgaria
来源
PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES, ELECTRONICS AND MECHANICAL SYSTEMS (CTEMS) | 2018年
关键词
Intrusion detection; Data Mining; Classifier; Feature Selection Algorithm; communication networks;
D O I
10.1109/CTEMS.2018.8769173
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Nowadays the network security is the important topic to research. The Network Security from different types of attacks which is R2L, U2R, and DoS. It is very challenging tasks due to variety of research problems like noise, large data size, inefficient features selection method etc. Network Intrusion Detection System (IDS), as the basic security protection technique, is generally used limiting such malicious attacks. In this project, we are presenting the efficient IDS solution using filter based feature choice strategy. We are exhibiting the hybrid feature determination method. The Intrusion Detection System (IDS) examine the main part in distortion and ambushes in the framework. In this examination work, data mining methods unite with association rule features extraction and classifier. In this paper, we proposed filter based hybrid feature selection algorithm (HFSA), most relevant features are retained and used to construct classifiers for respective classes. In this system it is worked on the real time packets, which is captured using the Jpcap library. Along with HFSA method, first we are contributing approach of detecting the cyber-attack brute force by modifying the algorithms of HFSA and classification. For the classification we used the Naive bayes classifier. The performance of proposed method shows the efficiency compared to other methods.
引用
收藏
页码:297 / 300
页数:4
相关论文
共 50 条
  • [1] Design of Intrusion Detection System Based on Data Mining Algorithm
    Song, Changxin
    Ma, Ke
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING SYSTEMS, 2009, : 370 - 373
  • [2] Algorithm of Intrusion Detection Based on Data Mining and Its Implementation
    孙海彬
    徐良贤
    陈彦华
    Journal of Donghua University(English Edition), 2004, (05) : 88 - 92
  • [3] An improved algorithm for fuzzy data mining for intrusion detection
    Florez, G
    Bridges, SM
    Vaughn, RB
    2002 ANNUAL MEETING OF THE NORTH AMERICAN FUZZY INFORMATION PROCESSING SOCIETY PROCEEDINGS, 2002, : 457 - 462
  • [4] Intrusion Detection Models Based on Data Mining
    Mao, Guojun
    Wu, Xindong
    Jiang, Xuxian
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2012, 5 (01): : 30 - 38
  • [5] Intrusion detection system based on data mining
    Zhang, Jishan
    Gan, Yong
    Bian, Zhiwei
    Fifth Wuhan International Conference on E-Business, Vols 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 1214 - 1218
  • [6] Intrusion scenarios detection based on data mining
    Ding, Yu-Xin
    Wang, Hai-Sen
    Liu, Qing-Wei
    PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 1293 - 1297
  • [7] Intrusion Detection Models Based on Data Mining
    Guojun Mao
    Xindong Wu
    Xuxian Jiang
    International Journal of Computational Intelligence Systems, 2012, 5 : 30 - 38
  • [8] Intrusion Detection Using Neural Networks: A Grid Computing Based Data Mining Approach
    Castellano, Marcello
    Mastronardi, Giuseppe
    Tarricone, Gianfranco
    NEURAL INFORMATION PROCESSING, PT 2, PROCEEDINGS, 2009, 5864 : 777 - 785
  • [9] Use of rule base data mining algorithm for Intrusion Detection
    Elekar, Kailas
    Waghmare, M. M.
    Priyadarshi, Amrit
    2015 INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING (ICPC), 2015,
  • [10] Applied Research on Data Mining Algorithm in Network Intrusion Detection
    Xue, Ming
    Zhu, Changjun
    FIRST IITA INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2009, : 275 - +