Mining network data for intrusion detection through Naïve Bayesian with clustering

被引:0
|
作者
Farid, Dewan Md [1 ]
Harbi, Nouria [2 ]
Ahmmed, Suman [3 ]
Rahman, Md. Zahidur [4 ]
Rahman, Chowdhury Mofizur [5 ]
机构
[1] ERIC Laboratory, University Lumière Lyon 2, 5 av. Pierre Mendes, France - 69676 BRON Cedex, France
[2] ERIC Laboratory, University Lumière Lyon 2, France
[3] University Lumière Lyon 2, France
[4] Department of Computer Science and Engineering, Jahangirnagar University, Bangladesh
[5] Department of Computer Science and Engineering, United International University, Bangladesh
关键词
Benchmarking - Clustering algorithms - Probability - Network security - Classification (of information) - Data mining;
D O I
暂无
中图分类号
学科分类号
摘要
Network security attacks are the violation of information security policy that received much attention to the computational intelligence society in the last decades. Data mining has become a very useful technique for detecting network intrusions by extracting useful knowledge from large number of network data or logs. Naïve Bayesian classifier is one of the most popular data mining algorithm for classification, which provides an optimal way to predict the class of an unknown example. It has been tested that one set of probability derived from data is not good enough to have good classification rate. In this paper, we proposed a new learning algorithm for mining network logs to detect network intrusions through naïve Bayesian classifier, which first clusters the network logs into several groups based on similarity of logs, and then calculates the prior and conditional probabilities for each group of logs. For classifying a new log, the algorithm checks in which cluster the log belongs and then use that cluster's probability set to classify the new log. We tested the performance of our proposed algorithm by employing KDD99 benchmark network intrusion detection dataset, and the experimental results proved that it improves detection rates as well as reduces false positives for different types of network intrusions.
引用
收藏
页码:341 / 345
相关论文
共 50 条
  • [31] Data mining based network intrusion detection method in the environment of IoT
    Wu, Guihua
    Xie, Lijing
    INTERNET TECHNOLOGY LETTERS, 2025, 8 (01)
  • [32] The Development of Computer Network Intrusion Detection System Based on Data Mining
    Shan, Chen
    MECHANICAL, MATERIALS AND MANUFACTURING ENGINEERING, PTS 1-3, 2011, 66-68 : 2248 - 2251
  • [33] Applying data mining of fuzzy association rules to network intrusion detection
    El-Semary, Aly
    Edmonds, Janica
    Gonzalez-Pino, Jesus
    Papa, Mauricio
    2006 IEEE INFORMATION ASSURANCE WORKSHOP, 2006, : 100 - +
  • [34] Network Intrusion Detection System Using various data mining techniques
    DikshantGupta
    SuhaniSinghal
    Malik, Shamita
    Singh, Archana
    2016 INTERNATIONAL CONFERENCE ON RESEARCH ADVANCES IN INTEGRATED NAVIGATION SYSTEMS (RAINS), 2016,
  • [35] A New Data-Mining Based Approach for Network Intrusion Detection
    Dartigue, Christine
    Jang, Hyun Ik
    Zeng, Wenjun
    2009 7TH ANNUAL COMMUNICATION NETWORKS AND SERVICES RESEARCH CONFERENCE, 2009, : 372 - 377
  • [36] Power information network intrusion detection based on data mining algorithm
    Zuo, Xiaojun
    Chen, Ze
    Dong, Limian
    Chang, Jie
    Hou, Botao
    JOURNAL OF SUPERCOMPUTING, 2020, 76 (07): : 5521 - 5539
  • [37] Approach Research on the Techniques for Network Intrusion Detection Based on Data Mining
    Gong Lina
    Xu Tao
    Zhang Wei
    Li XuHong
    Wang Xia
    Pan Wenwen
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON APPLIED SCIENCE AND ENGINEERING INNOVATION, 2015, 12 : 2133 - 2136
  • [38] The intrusion data mining method for distributed network based on fuzzy kernel clustering algorithm
    Li, Linlin
    INTERNATIONAL JOURNAL OF AUTONOMOUS AND ADAPTIVE COMMUNICATIONS SYSTEMS, 2022, 15 (01) : 32 - 45
  • [39] Data Mining and Intrusion Detection Systems
    Dewa, Zibusiso
    Maglaras, Leandros A.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (01) : 62 - 71
  • [40] Intrusion detection using data mining
    Puthran, Shubha
    Shah, Ketan
    Puthran, Shubha (shubha.puthran@nmims.edu), 1600, Inderscience Publishers (09): : 292 - 306