Mining network data for intrusion detection through Naïve Bayesian with clustering

被引:0
|
作者
Farid, Dewan Md [1 ]
Harbi, Nouria [2 ]
Ahmmed, Suman [3 ]
Rahman, Md. Zahidur [4 ]
Rahman, Chowdhury Mofizur [5 ]
机构
[1] ERIC Laboratory, University Lumière Lyon 2, 5 av. Pierre Mendes, France - 69676 BRON Cedex, France
[2] ERIC Laboratory, University Lumière Lyon 2, France
[3] University Lumière Lyon 2, France
[4] Department of Computer Science and Engineering, Jahangirnagar University, Bangladesh
[5] Department of Computer Science and Engineering, United International University, Bangladesh
关键词
Benchmarking - Clustering algorithms - Probability - Network security - Classification (of information) - Data mining;
D O I
暂无
中图分类号
学科分类号
摘要
Network security attacks are the violation of information security policy that received much attention to the computational intelligence society in the last decades. Data mining has become a very useful technique for detecting network intrusions by extracting useful knowledge from large number of network data or logs. Naïve Bayesian classifier is one of the most popular data mining algorithm for classification, which provides an optimal way to predict the class of an unknown example. It has been tested that one set of probability derived from data is not good enough to have good classification rate. In this paper, we proposed a new learning algorithm for mining network logs to detect network intrusions through naïve Bayesian classifier, which first clusters the network logs into several groups based on similarity of logs, and then calculates the prior and conditional probabilities for each group of logs. For classifying a new log, the algorithm checks in which cluster the log belongs and then use that cluster's probability set to classify the new log. We tested the performance of our proposed algorithm by employing KDD99 benchmark network intrusion detection dataset, and the experimental results proved that it improves detection rates as well as reduces false positives for different types of network intrusions.
引用
收藏
页码:341 / 345
相关论文
共 50 条
  • [1] Mining network data for intrusion detection through Naïve Bayesian with clustering
    Md. Farid, Dewan
    Harbi, Nouria
    Ahmmed, Suman
    Rahman, Md. Zahidur
    Rahman, Chowdhury Mofizur
    World Academy of Science, Engineering and Technology, 2010, 42 : 340 - 345
  • [2] Skyline computation for improving naïve Bayesian classifier in intrusion detection system
    Alem A.
    Dahmani Y.
    Mebarek B.
    Ingenierie des Systemes d'Information, 2019, 24 (05): : 513 - 518
  • [3] Network Intrusion Detection System Using Data Mining
    Lima de Campos, Lidio Mauro
    Limao de Oliveira, Roberto Celio
    Roisenberg, Mauro
    ENGINEERING APPLICATIONS OF NEURAL NETWORKS, 2012, 311 : 104 - 113
  • [4] Research on the Application of the Data Mining in Network Intrusion Detection
    Shen, Wei
    2014 2ND INTERNATIONAL CONFERENCE ON ECONOMIC, BUSINESS MANAGEMENT AND EDUCATION INNOVATION (EBMEI 2014), VOL 38, 2014, 38 : 234 - 237
  • [5] Data stream mining architecture for network intrusion detection
    Chu, NCN
    Williams, A
    Alhajj, R
    Barker, K
    PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI-2004), 2004, : 363 - 368
  • [6] Mining network data for intrusion detection through combining SVMs with ant colony networks
    Feng, Wenying
    Zhang, Qinglei
    Hu, Gongzhu
    Huang, Jimmy Xiangji
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 37 : 127 - 140
  • [7] Data mining for network intrusion detection: A comparison of alternative methods
    Zhu, D
    Premkumar, G
    Zhang, XN
    Chu, CH
    DECISION SCIENCES, 2001, 32 (04) : 635 - 660
  • [8] A rough neuro data mining approach for network intrusion detection
    Bhaskar, T
    Kamath, BN
    DISTRIBUTED COMPUTING - IWDC 2004, PROCEEDINGS, 2004, 3326 : 534 - 534
  • [9] Applied Research on Data Mining Algorithm in Network Intrusion Detection
    Xue, Ming
    Zhu, Changjun
    FIRST IITA INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2009, : 275 - +
  • [10] AN INTELLIGENT NETWORK INTRUSION DETECTION USING DATA MINING TECHNIQUES
    Shukran, Mohd Afizi Mohd
    Maskat, Kamaruzaman
    JURNAL TEKNOLOGI, 2015, 76 (12): : 127 - 131