Data Mining Based Advanced Algorithm for Intrusion Detections in Communication Networks

被引:3
|
作者
Bhosale, Karuna S. [1 ]
Nenova, Maria [1 ]
Iliev, Georgi [1 ]
机构
[1] Tech Univ Sofia, Fac Telecommun, Sofia, Bulgaria
来源
PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES, ELECTRONICS AND MECHANICAL SYSTEMS (CTEMS) | 2018年
关键词
Intrusion detection; Data Mining; Classifier; Feature Selection Algorithm; communication networks;
D O I
10.1109/CTEMS.2018.8769173
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Nowadays the network security is the important topic to research. The Network Security from different types of attacks which is R2L, U2R, and DoS. It is very challenging tasks due to variety of research problems like noise, large data size, inefficient features selection method etc. Network Intrusion Detection System (IDS), as the basic security protection technique, is generally used limiting such malicious attacks. In this project, we are presenting the efficient IDS solution using filter based feature choice strategy. We are exhibiting the hybrid feature determination method. The Intrusion Detection System (IDS) examine the main part in distortion and ambushes in the framework. In this examination work, data mining methods unite with association rule features extraction and classifier. In this paper, we proposed filter based hybrid feature selection algorithm (HFSA), most relevant features are retained and used to construct classifiers for respective classes. In this system it is worked on the real time packets, which is captured using the Jpcap library. Along with HFSA method, first we are contributing approach of detecting the cyber-attack brute force by modifying the algorithms of HFSA and classification. For the classification we used the Naive bayes classifier. The performance of proposed method shows the efficiency compared to other methods.
引用
收藏
页码:297 / 300
页数:4
相关论文
共 50 条
  • [21] Data mining for intrusion detection
    Liu, DH
    Wang, HZ
    Wang, XM
    2001 INTERNATIONAL CONFERENCES ON INFO-TECH AND INFO-NET PROCEEDINGS, CONFERENCE A-G: INFO-TECH & INFO-NET: A KEY TO BETTER LIFE, 2001, : E7 - E12
  • [22] A New Model of Intrusion Detection Based on Data Warehouse and Data Mining
    Qi, Bei
    Dong, Yunfeng
    MANUFACTURING SCIENCE AND TECHNOLOGY, PTS 1-8, 2012, 383-390 : 303 - +
  • [23] Overview of Data Mining Based Adaptive Intrusion Detection Techniques
    Liu, Yangbin
    Shi, Liang
    Wang, Beizhan
    Wang, Panhong
    2ND INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2010), VOLS 1 AND 2, 2010, : 702 - 706
  • [24] Research on the data-mining-based intrusion detection technology
    Li, Guobin
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 1, 2008, : 515 - 518
  • [25] Network intrusion detection based on system calls and data mining
    Xinguang Tian
    Xueqi Cheng
    Miyi Duan
    Rui Liao
    Hong Chen
    Xiaojuan Chen
    Frontiers of Computer Science in China, 2010, 4 : 522 - 528
  • [26] Network intrusion detection based on system calls and data mining
    Tian, Xinguang
    Cheng, Xueqi
    Duan, Miyi
    Liao, Rui
    Chen, Hong
    Chen, Xiaojuan
    FRONTIERS OF COMPUTER SCIENCE IN CHINA, 2010, 4 (04): : 522 - 528
  • [27] Survey of Intrusion Detection Methods Based on Data Mining Algorithms
    Jin, Zichuan
    Cui, Yanpeng
    Yan, Zheng
    BDE 2019: 2019 INTERNATIONAL CONFERENCE ON BIG DATA ENGINEERING, 2019, : 92 - 100
  • [28] Design of Intrusion Detection Model Based on Data Mining Technology
    Li Yin-huan
    2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE), 2012, : 571 - 574
  • [29] Research on Intrusion Detection System Model Based on Data Mining
    Zhu Limiao
    Huang Hua
    Zheng Hao
    2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 113 - 116
  • [30] A Model of Intrusion Detection Based on Data Mining in Campus Network
    Qi Bei
    Dong Yun-feng
    NATIONAL CONFERENCE OF HIGHER VOCATIONAL AND TECHNICAL EDUCATION ON COMPUTER INFORMATION, 2010, : 317 - +