Effective approach toward Intrusion Detection System using data mining techniques

被引:96
作者
Nadiammai, G. V. [1 ]
Hemalatha, M. [1 ]
机构
[1] Karpagam Univ, Dept Comp Sci, Coimbatore 641021, Tamil Nadu, India
关键词
Anomaly based algorithm; Classification algorithms; Data communication; Denial of service attack; Intrusion detection;
D O I
10.1016/j.eij.2013.10.003
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the tremendous growth of the usage of computers over network and development in application running on various platform captures the attention toward network security. This paradigm exploits security vulnerabilities on all computer systems that are technically difficult and expensive to solve. Hence intrusion is used as a key to compromise the integrity, availability and confidentiality of a computer resource. The Intrusion Detection System (IDS) plays a vital role in detecting anomalies and attacks in the network. In this work, data mining concept is integrated with an IDS to identify the relevant, hidden data of interest for the user effectively and with less execution time. Four issues such as Classification of Data, High Level of Human Interaction, Lack of Labeled Data, and Effectiveness of Distributed Denial of Service Attack are being solved using the proposed algorithms like EDADT algorithm, Hybrid IDS model, Semi-Supervised Approach and Varying HOPERAA Algorithm respectively. Our proposed algorithm has been tested using KDD Cup dataset. All the proposed algorithm shows better accuracy and reduced false alarm rate when compared with existing algorithms. (C) 2013 Production and hosting by Elsevier B.V. on behalf of Faculty of Computers and Information, Cairo University.
引用
收藏
页码:37 / 50
页数:14
相关论文
共 23 条
  • [1] Anderson JP, 1980, TECHNICAL REPORT
  • [2] Ardjani F., 2010, INT J MOD ED COMPUT, V2, P32, DOI [10.5815/ijmecs.2010.02.05, DOI 10.5815/IJMECS.2010.02.05]
  • [3] Bhuyan MH, 2012, PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI'12), P533
  • [4] Automatic network intrusion detection: Current techniques and open issues
    Catania, Carlos A.
    Garcia Garino, Carlos
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2012, 38 (05) : 1062 - 1072
  • [5] Chiu CY, 2010, LECT NOTES ARTIF INT, V6171, P595, DOI 10.1007/978-3-642-14400-4_46
  • [6] Denis Petrussenko, 2009, CS200902 FLOR I TECH
  • [7] Ektefa Mohammadreza, 2010, Proceedings of the 2010 International Conference on Information Retrieval and Knowledge Management (CAMP 2010), P200, DOI 10.1109/INFRKM.2010.5466919
  • [8] Fu Z, 2011, P 2011 ACM S APPL CO, P520
  • [9] Off The Wall: Lightweight Distributed Filtering to Mitigate Distributed Denial of Service Attacks
    Fu, Zhang
    Papatriantafilou, Marina
    [J]. 2012 31ST INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS 2012), 2012, : 207 - 212
  • [10] Mitigating Distributed Denial of Service Attacks in Multiparty Applications in the Presence of Clock Drifts
    Fu, Zhang
    Papatriantafilou, Marina
    Tsigas, Philippas
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (03) : 401 - 413