An Intrusion Detection Model for Detecting Type of Attack Using Data Mining

作者: Shyam Gupta , Amruta Surana

DOI:

关键词: Feature selectionAnomaly-based intrusion detection systemFeature (computer vision)Identification (information)Intrusion detection systemData miningCluster analysisAnomaly detectionNaive Bayes classifierEngineering

摘要: Intrusion detection systems (IDS) are important elements in a network's defenses to help protect against increasingly sophisticated cyber attacks. This project objective presents novel anomaly technique that cans b e u s d detect previously unknown attacks on network by identifying attack features. effects -based feature identification method uniquely combines k- means clustering; Naive Bayes selection and 4.5 c i o n tree classification for finding with high degree of accuracy it used KDD99CUP dataset as input. Basically whether this there or not like IPSWEEP, NEPTUNE, SMURF. Conclusions: Give brief concluding remarks outcomes what present how find.

参考文章(9)
James C. Bezdek, Robert Ehrlich, William Full, FCM: The fuzzy c-means clustering algorithm Computers & Geosciences. ,vol. 10, pp. 191- 203 ,(1984) , 10.1016/0098-3004(84)90020-7
Alejandra Urtubia, J. Ricardo Pérez-Correa, Alvaro Soto, Philippo Pszczólkowski, Using data mining techniques to predict industrial wine problem fermentations Food Control. ,vol. 18, pp. 1512- 1517 ,(2007) , 10.1016/J.FOODCONT.2006.09.010
T. Velmurugan, T. Santhanam, A Survey of Partition based Clustering Algorithms in Data Mining: An Experimental Approach Information Technology Journal. ,vol. 10, pp. 478- 484 ,(2011) , 10.3923/ITJ.2011.478.484
Upeka Premaratne, Charles Ling, Jagath Samarabandu, Tarlochan Sidhu, Possibilistic decision trees for Intrusion Detection in IEC61850 automated substations international conference on industrial and information systems. pp. 204- 209 ,(2009) , 10.1109/ICIINFS.2009.5429863
Sandhya Peddabachigari, Ajith Abraham, Crina Grosan, Johnson Thomas, None, Modeling intrusion detection system using hybrid intelligent systems Journal of Network and Computer Applications. ,vol. 30, pp. 114- 132 ,(2007) , 10.1016/J.JNCA.2005.06.003
Shelly Xiaonan Wu, Wolfgang Banzhaf, The use of computational intelligence in intrusion detection systems: A review Applied Soft Computing. ,vol. 10, pp. 1- 35 ,(2010) , 10.1016/J.ASOC.2009.06.019
H G Kayacik, A N Zincir Heywood, M I Heywood, SELECTING FEATURES FOR INTRUSION DETECTION: A FEATURE RELEVANCE ANALYSIS ON KDD 99 INTRUSION DETECTION DATASETS PROCEEDINGS OF THE ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST. pp. 0- 0 ,(2005)
H. Herne, William W. Cooley, Paul R. Lohnes, Multivariate Data Analysis Journal of the Royal Statistical Society: Series A (General). ,vol. 136, pp. 101- 103 ,(1973) , 10.2307/2344428