Data Mining Based Advanced Algorithm for Intrusion Detections in Communication Networks

被引:3
|
作者
Bhosale, Karuna S. [1 ]
Nenova, Maria [1 ]
Iliev, Georgi [1 ]
机构
[1] Tech Univ Sofia, Fac Telecommun, Sofia, Bulgaria
来源
PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES, ELECTRONICS AND MECHANICAL SYSTEMS (CTEMS) | 2018年
关键词
Intrusion detection; Data Mining; Classifier; Feature Selection Algorithm; communication networks;
D O I
10.1109/CTEMS.2018.8769173
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Nowadays the network security is the important topic to research. The Network Security from different types of attacks which is R2L, U2R, and DoS. It is very challenging tasks due to variety of research problems like noise, large data size, inefficient features selection method etc. Network Intrusion Detection System (IDS), as the basic security protection technique, is generally used limiting such malicious attacks. In this project, we are presenting the efficient IDS solution using filter based feature choice strategy. We are exhibiting the hybrid feature determination method. The Intrusion Detection System (IDS) examine the main part in distortion and ambushes in the framework. In this examination work, data mining methods unite with association rule features extraction and classifier. In this paper, we proposed filter based hybrid feature selection algorithm (HFSA), most relevant features are retained and used to construct classifiers for respective classes. In this system it is worked on the real time packets, which is captured using the Jpcap library. Along with HFSA method, first we are contributing approach of detecting the cyber-attack brute force by modifying the algorithms of HFSA and classification. For the classification we used the Naive bayes classifier. The performance of proposed method shows the efficiency compared to other methods.
引用
收藏
页码:297 / 300
页数:4
相关论文
共 50 条
  • [31] Design of data mining-based intrusion detection system
    Su, MD
    Liu, DQ
    Li, YF
    ICEMI 2005: Conference Proceedings of the Seventh International Conference on Electronic Measurement & Instruments, Vol 2, 2005, : 93 - 95
  • [32] A novel adaptive intrusion detection system based on data mining
    Yu, ZX
    Chen, JR
    Zhu, TQ
    PROCEEDINGS OF 2005 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-9, 2005, : 2390 - 2395
  • [33] Hybrid intrusion detection based on data mining
    Zhang, Lei
    Zhang, Jianqing
    Chen, Yong
    Liao, Shaowen
    2018 11TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION (ICICTA 2018), 2018, : 299 - 301
  • [34] The intrusion data mining method for distributed network based on fuzzy kernel clustering algorithm
    Li, Linlin
    INTERNATIONAL JOURNAL OF AUTONOMOUS AND ADAPTIVE COMMUNICATIONS SYSTEMS, 2022, 15 (01) : 32 - 45
  • [35] Research on intrusion detection based on data mining
    Tong, Xiaojun
    Cui, Minggen
    Wang, Jie
    PROGRESS IN INTELLIGENCE COMPUTATION AND APPLICATIONS, PROCEEDINGS, 2007, : 444 - 447
  • [36] Data Mining and Intrusion Detection Systems
    Dewa, Zibusiso
    Maglaras, Leandros A.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (01) : 62 - 71
  • [37] Intrusion discovery with data mining on Honeynet
    Yin, R
    Zhang, G
    Chen, YQ
    2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS, 2003, : 41 - 45
  • [38] A Study of Intrusion Detection in Data Mining
    Reddy, E. Kesavalu
    Reddy, V. Naveen
    Rajulu, P. Govinda
    WORLD CONGRESS ON ENGINEERING, WCE 2011, VOL III, 2011, : 1889 - 1894
  • [39] Realization of Intrusion Detection System based on the Improved Data Mining Technology
    Zhao Yan Jun
    Wei Ming Jun
    Wang Jing
    PROCEEDINGS OF THE 2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2013), 2013, : 982 - 987
  • [40] A New Data-Mining Based Approach for Network Intrusion Detection
    Dartigue, Christine
    Jang, Hyun Ik
    Zeng, Wenjun
    2009 7TH ANNUAL COMMUNICATION NETWORKS AND SERVICES RESEARCH CONFERENCE, 2009, : 372 - 377