Data Mining Based Advanced Algorithm for Intrusion Detections in Communication Networks

被引:3
|
作者
Bhosale, Karuna S. [1 ]
Nenova, Maria [1 ]
Iliev, Georgi [1 ]
机构
[1] Tech Univ Sofia, Fac Telecommun, Sofia, Bulgaria
来源
PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES, ELECTRONICS AND MECHANICAL SYSTEMS (CTEMS) | 2018年
关键词
Intrusion detection; Data Mining; Classifier; Feature Selection Algorithm; communication networks;
D O I
10.1109/CTEMS.2018.8769173
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Nowadays the network security is the important topic to research. The Network Security from different types of attacks which is R2L, U2R, and DoS. It is very challenging tasks due to variety of research problems like noise, large data size, inefficient features selection method etc. Network Intrusion Detection System (IDS), as the basic security protection technique, is generally used limiting such malicious attacks. In this project, we are presenting the efficient IDS solution using filter based feature choice strategy. We are exhibiting the hybrid feature determination method. The Intrusion Detection System (IDS) examine the main part in distortion and ambushes in the framework. In this examination work, data mining methods unite with association rule features extraction and classifier. In this paper, we proposed filter based hybrid feature selection algorithm (HFSA), most relevant features are retained and used to construct classifiers for respective classes. In this system it is worked on the real time packets, which is captured using the Jpcap library. Along with HFSA method, first we are contributing approach of detecting the cyber-attack brute force by modifying the algorithms of HFSA and classification. For the classification we used the Naive bayes classifier. The performance of proposed method shows the efficiency compared to other methods.
引用
收藏
页码:297 / 300
页数:4
相关论文
共 50 条
  • [41] Hybrid Multithreaded Pattern Matching Algorithm for Intrusion Detections Systems
    Aldwairi, Monther
    Ekailan, Niveen
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2011, 6 (06): : 512 - 521
  • [42] The model and algorithm of automatic data-mining of network intrusion, characteristics
    Huang, HY
    Wang, XG
    PROCEEDINGS OF THE 4TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-4, 2002, : 2701 - 2704
  • [43] Application of Data Mining Techniques in Intrusion Detection
    Li Min
    CALL OF PAPER PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING, 2008, : 1273 - 1277
  • [44] Combined data mining approach for intrusion detection
    Zurutuza, U.
    Uribeetxeberria, R.
    Azketa, E.
    Gil, G.
    Lizarraga, J.
    Fernandez, M.
    SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 67 - 73
  • [45] Intrusion detection using data mining techniques
    Reddy, YB
    Guha, R
    Proceedings of the IASTED International Conference on Artificial Intelligence and Applications, Vols 1and 2, 2004, : 26 - 30
  • [46] Advanced Clustering Based Intrusion Detection (ACID) Algorithm
    Borah, Samarjeet
    Chakravorty, Debaditya
    Chawhan, Chandan
    Saha, Aritra
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT III, 2011, 192 : 35 - 43
  • [47] Integrating Intrusion Detection System and Data Mining
    Yusufovna, Sattarova Feruza
    INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS, 2008, : 256 - 259
  • [48] Applying Data Mining Techniques to Intrusion Detection
    Ng, Jonathon
    Joshi, Deepti
    Banik, Shankar M.
    2015 12TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY - NEW GENERATIONS, 2015, : 800 - 801
  • [49] Application of Data Mining to Network Intrusion Detection: Classifier Selection Model
    Nguyen, Huy Anh
    Choi, Deokjai
    CHALLENGES FOR NEXT GENERATION NETWORK OPERATIONS AND SERVICE MANAGEMENT, PROCEEDINGS, 2008, 5297 : 399 - 408
  • [50] An Overview of Intrusion Detection Based on Data Mining Techniques
    Wankhade, Kapil
    Patka, Sadia
    Thool, Ravinrda
    2013 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2013), 2013, : 626 - 629