Effective approach toward Intrusion Detection System using data mining techniques

被引:95
|
作者
Nadiammai, G. V. [1 ]
Hemalatha, M. [1 ]
机构
[1] Karpagam Univ, Dept Comp Sci, Coimbatore 641021, Tamil Nadu, India
关键词
Anomaly based algorithm; Classification algorithms; Data communication; Denial of service attack; Intrusion detection;
D O I
10.1016/j.eij.2013.10.003
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the tremendous growth of the usage of computers over network and development in application running on various platform captures the attention toward network security. This paradigm exploits security vulnerabilities on all computer systems that are technically difficult and expensive to solve. Hence intrusion is used as a key to compromise the integrity, availability and confidentiality of a computer resource. The Intrusion Detection System (IDS) plays a vital role in detecting anomalies and attacks in the network. In this work, data mining concept is integrated with an IDS to identify the relevant, hidden data of interest for the user effectively and with less execution time. Four issues such as Classification of Data, High Level of Human Interaction, Lack of Labeled Data, and Effectiveness of Distributed Denial of Service Attack are being solved using the proposed algorithms like EDADT algorithm, Hybrid IDS model, Semi-Supervised Approach and Varying HOPERAA Algorithm respectively. Our proposed algorithm has been tested using KDD Cup dataset. All the proposed algorithm shows better accuracy and reduced false alarm rate when compared with existing algorithms. (C) 2013 Production and hosting by Elsevier B.V. on behalf of Faculty of Computers and Information, Cairo University.
引用
收藏
页码:37 / 50
页数:14
相关论文
共 50 条
  • [31] Integrating data mining techniques with intrusion detection methods
    Mukkamala, R
    Gagnon, J
    Jajodia, S
    RESEARCH ADVANCES IN DATABASE AND INFORMATION SYSTEMS SECURITY, 2000, 43 : 33 - 46
  • [32] Intrusion Detection System using Stream Data Mining and Drift Detection Method
    Kumar, Manish
    Hanumanthappa, M.
    2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [33] Intrusion detection system based on data mining
    Zhang, Jishan
    Gan, Yong
    Bian, Zhiwei
    Fifth Wuhan International Conference on E-Business, Vols 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 1214 - 1218
  • [34] Intrusion detection system based on data mining
    Zhan Jinhua
    FIRST INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2007, : 402 - 405
  • [35] Integrating Intrusion Detection System and Data Mining
    Yusufovna, Sattarova Feruza
    INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS, 2008, : 256 - 259
  • [36] Research on Principle Techniques for Network Intrusion Detection based on Data Mining and Analysis Approach
    Jiang Shan
    Chen Changai
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS RESEARCH AND MECHATRONICS ENGINEERING, 2015, 121 : 513 - 517
  • [37] Building an Effective Approach toward Intrusion Detection Using Ensemble Feature Selection
    Shukla, Alok Kumar
    Singh, Pradeep
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2019, 13 (03) : 31 - 47
  • [38] Intrusion Detection System using Fuzzy Logic and Data Mining Technique
    Chapke, Prajkta P.
    Deshmukh, Rupali R.
    ICARCSET'15: PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON ADVANCED RESEARCH IN COMPUTER SCIENCE ENGINEERING & TECHNOLOGY (ICARCSET - 2015), 2015,
  • [39] Intrusion Detection System by Using Hybrid Algorithm of Data Mining Technique
    Foroushani, Zohreh Abtahi
    Li, Yue
    PROCEEDINGS OF 2018 7TH INTERNATIONAL CONFERENCE ON SOFTWARE AND COMPUTER APPLICATIONS (ICSCA 2018), 2018, : 119 - 123
  • [40] A NOVEL SIGNATURE SEARCHING FOR INTRUSION DETECTION SYSTEM USING DATA MINING
    Ding, Ya-Li
    Li, Lei
    Luo, Hong-Qi
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-6, 2009, : 122 - 126