A Study of Intrusion Detection System using Efficient Data Mining Techniques

Authors

  • P. Rutravigneshwaran Department of Computer Application, Rev. Jacob Memorial Christian College, Ambilikkai, India

Keywords:

Classification tree, SVM, FHRVM, Internet attack, Intrusion detection system (IDS)

Abstract

IDS is a software consequence monitors the humiliation or behavior plus investigate any immoral operation suggest itself. Fantastic increase and tradition of internet raises concerns in relation to how to defend and communicate the digital in order in a safe approach. Nowadays, hackers use different types of attacks for getting the valuable information. IntheproposedFast Hierarchical Relevance Vector Machine (FHRVM), AnalyticalHierarchy ProcessMethod (AHP) isusedtoselect the inputweightsandhiddenbiases. Simulation has been carried out using Math works MATLAB R2012a. KDD Cup 1999 dataset istakenfor testingthe performanceoftheproposedworkandtheresults indicate that FHRVM has achieved higher detectionrate and lowfalse alarmrate thanthat ofexistingSVMalgorithm. This research evaluate the efficiency of machine learning methods in intrusion detection system, together with classification tree and support vector machine, with the expect of given that reference for establishing intrusion detection system in future. Compared with further interrelated works in data mining-based intrusion detectors accuracy, detection rate, false alarm rate. It moreover show improved act than KDD Winner, particularly used for two types of attacks namely, U2R type and R2L type. Comparison results of C4.5, SVM. we finds that C4.5 is superior to SVM in accuracy and detection; in accuracy for Probe,Dos and U2R attacks, C4.5 is also better than SVM and FHRVM; but in false alarm rate FHRVM is better. In this paper enhance that FHRVM is better than c4.5 and SVM for U2R attack & R2L attack.

 

References

James P. Anderson, “Computer Security Threat Monitoring and Surveillance,” Technical report, James P. Anderson Co., Fort Washington, Pennsylvania. April 1980.

Tomas Abraham, “IDDM: INTRUSION Detection using Data Mining Techniques”, Technical report DTSO

MahbodTavallaee, IbrahimBagheri, Wei Lu, and Ali A. Ghorbanifar A Detailed Analysis of the KDD CUP 99 Data Set proceeding of the 2009 IEEE symposium on computational Intelligence in security and defense application .

Xiao a Wang, Zhaohui Shi, Chongqing Wu and Wei Wang. An Improved Algorithm for Decision-Tree-Based SVM.IEEE-2006.

Pang-Ming Tan, Michael Steinbach, Vidin Kumar. Introduction to data mining.Pearson Education.

Liu, Y., Wang, Z., Fang, Y., &GU, H. Y. (2006). Dos intrusion detection based onincremental learning with support vector machines. Computer Engineering,32(4), 179–186.

P.Rutravigneshwaran “Intrusion Detection using Neutrosophic classifier” published in IJST Vol.2 Issue.13, Dec 2014.

Peddabachigari, S., Abraham, A., Groans, C., & Thomas, J. (2007). Modeling intrusiondetection system using hybrid intelligent systems. Journal of Network andComputer Applications, 30(1), 114–132

Nadiammai, Hemalatha, "Perspective analysis of machine learning algorithms for detecting network intrusions" 2012 Third International Conference onComputing Communication & Networking Technologies (ICCCNT), 2012 , Page(s): 1 - 7.

Natesan,Rajesh, "Cascaded classifier approach based on Adaboost to increase detection rate of rare network attack categories" 2012 International Conference on Recent Trends In Information Technology (ICRTIT),2012 , Page(s): 417 - 422.

Landwehr, Bull, McDermott, and Choi, “A taxonomy of computer program security flaws,” ACM Comput. Surv., vol. 26, no. 3, pp. 211–254, 1994.

KDD Cup 1999. Available on: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html, Ocotber 2007.

Lippmann, Fried, Graf, Haines, Kendall, McClung, Weber, Webster, Wyschogrod, Cunningham, Zissman, “Evaluating intrusion detection systems: The 1998 darpa off-line intrusion detection evaluation,” discex, vol. 02,p. 1012, 2000.

Stolfo, Fan, Lee, Prodromidis, Chan, “Costbased modeling for fraud and intrusion detection: Results from the jam project,” discex, vol. 02, p. 1130, 2000.

Reda Elbasiony, Elsayed Sallam, Tarek Eltobely, Mahmoud Fahmy, "A hybrid network intrusion detection framework based on random forests and weighted k-means", Ain Shams Engineering Journal, Elsevier, 2013 4, 753–762.

Downloads

Published

2017-12-31

How to Cite

[1]
P. Rutravigneshwaran, “A Study of Intrusion Detection System using Efficient Data Mining Techniques”, Int. J. Sci. Res. Net. Sec. Comm., vol. 5, no. 6, pp. 5–8, Dec. 2017.

Issue

Section

Review Article

Similar Articles

<< < 1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.