Effective approach toward Intrusion Detection System using data mining techniques

被引:95
|
作者
Nadiammai, G. V. [1 ]
Hemalatha, M. [1 ]
机构
[1] Karpagam Univ, Dept Comp Sci, Coimbatore 641021, Tamil Nadu, India
关键词
Anomaly based algorithm; Classification algorithms; Data communication; Denial of service attack; Intrusion detection;
D O I
10.1016/j.eij.2013.10.003
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the tremendous growth of the usage of computers over network and development in application running on various platform captures the attention toward network security. This paradigm exploits security vulnerabilities on all computer systems that are technically difficult and expensive to solve. Hence intrusion is used as a key to compromise the integrity, availability and confidentiality of a computer resource. The Intrusion Detection System (IDS) plays a vital role in detecting anomalies and attacks in the network. In this work, data mining concept is integrated with an IDS to identify the relevant, hidden data of interest for the user effectively and with less execution time. Four issues such as Classification of Data, High Level of Human Interaction, Lack of Labeled Data, and Effectiveness of Distributed Denial of Service Attack are being solved using the proposed algorithms like EDADT algorithm, Hybrid IDS model, Semi-Supervised Approach and Varying HOPERAA Algorithm respectively. Our proposed algorithm has been tested using KDD Cup dataset. All the proposed algorithm shows better accuracy and reduced false alarm rate when compared with existing algorithms. (C) 2013 Production and hosting by Elsevier B.V. on behalf of Faculty of Computers and Information, Cairo University.
引用
收藏
页码:37 / 50
页数:14
相关论文
共 50 条
  • [1] Intrusion detection using data mining techniques
    Reddy, YB
    Guha, R
    Proceedings of the IASTED International Conference on Artificial Intelligence and Applications, Vols 1and 2, 2004, : 26 - 30
  • [2] Intelligent Network Intrusion Detection System using Data Mining Techniques
    Sultana, Amreen
    Jabbar, M. A.
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2016, : 329 - 333
  • [3] Network Intrusion Detection System Using various data mining techniques
    DikshantGupta
    SuhaniSinghal
    Malik, Shamita
    Singh, Archana
    2016 INTERNATIONAL CONFERENCE ON RESEARCH ADVANCES IN INTEGRATED NAVIGATION SYSTEMS (RAINS), 2016,
  • [4] Intrusion detection and identification system using data mining and forensic techniques
    Len, Fang-Yie
    Hu, Kai-Wei
    Jiang, Fuu-Cheng
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2007, 4752 : 137 - +
  • [5] Fusion of Multiple Data Mining Techniques for Effective Network Intrusion Detection - A Contemporary Approach
    Chandrashekar, A. M.
    Raghuveer, K.
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2012, : 178 - 182
  • [6] Combination of Data Mining Techniques for Intrusion Detection System
    Elekar, Kailas Shivshankar
    2015 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONTROL (IC4), 2015,
  • [7] Data Mining Techniques for Intrusion Detection and Prevention System
    Chalak, Ashok
    Harale, Naresh D.
    Bhosale, Rohini
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (08): : 200 - 203
  • [8] Classification of Intrusion Detection Using Data Mining Techniques
    Sahani, Roma
    Shatabdinalini
    Rout, Chinmayee
    Badajena, J. Chandrakanta
    Jena, Ajay Kumar
    Das, Himansu
    PROGRESS IN COMPUTING, ANALYTICS AND NETWORKING, ICCAN 2017, 2018, 710 : 753 - 764
  • [9] An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques
    Leu, Fang-Yie
    Tsai, Kun-Lin
    Hsiao, Yi-Ting
    Yang, Chao-Tung
    IEEE SYSTEMS JOURNAL, 2017, 11 (02): : 427 - 438
  • [10] An Intelligent Approach for Intrusion Detection Based on Data Mining Techniques
    Haque, Mohd Junedul
    Magld, Khalid W.
    Hundewale, Nisar
    2012 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2012, : 13 - 17