Full Paper View Go Back

A Study of Intrusion Detection System using Efficient Data Mining Techniques

P. Rutravigneshwaran1

1 Department of Computer Application, Rev. Jacob Memorial Christian College, Ambilikkai, India.

Correspondence should be addressed to: rutra20190@gmail.com.


Section:Review Paper, Product Type: Journal
Vol.5 , Issue.6 , pp.5-8, Dec-2017


CrossRef-DOI:   https://doi.org/10.26438/ijsrnsc/v5i6.58


Online published on Dec 31, 2017


Copyright © P. Rutravigneshwaran . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: P. Rutravigneshwaran, “A Study of Intrusion Detection System using Efficient Data Mining Techniques,” International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.6, pp.5-8, 2017.

MLA Style Citation: P. Rutravigneshwaran "A Study of Intrusion Detection System using Efficient Data Mining Techniques." International Journal of Scientific Research in Network Security and Communication 5.6 (2017): 5-8.

APA Style Citation: P. Rutravigneshwaran, (2017). A Study of Intrusion Detection System using Efficient Data Mining Techniques. International Journal of Scientific Research in Network Security and Communication, 5(6), 5-8.

BibTex Style Citation:
@article{Rutravigneshwaran_2017,
author = {P. Rutravigneshwaran},
title = {A Study of Intrusion Detection System using Efficient Data Mining Techniques},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {12 2017},
volume = {5},
Issue = {6},
month = {12},
year = {2017},
issn = {2347-2693},
pages = {5-8},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=308},
doi = {https://doi.org/10.26438/ijcse/v5i6.58}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v5i6.58}
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=308
TI - A Study of Intrusion Detection System using Efficient Data Mining Techniques
T2 - International Journal of Scientific Research in Network Security and Communication
AU - P. Rutravigneshwaran
PY - 2017
DA - 2017/12/31
PB - IJCSE, Indore, INDIA
SP - 5-8
IS - 6
VL - 5
SN - 2347-2693
ER -

1221 Views    461 Downloads    475 Downloads
  
  

Abstract :
IDS is a software consequence monitors the humiliation or behavior plus investigate any immoral operation suggest itself. Fantastic increase and tradition of internet raises concerns in relation to how to defend and communicate the digital in order in a safe approach. Nowadays, hackers use different types of attacks for getting the valuable information. IntheproposedFast Hierarchical Relevance Vector Machine (FHRVM), AnalyticalHierarchy ProcessMethod (AHP) isusedtoselect the inputweightsandhiddenbiases. Simulation has been carried out using Math works MATLAB R2012a. KDD Cup 1999 dataset istakenfor testingthe performanceoftheproposedworkandtheresults indicate that FHRVM has achieved higher detectionrate and lowfalse alarmrate thanthat ofexistingSVMalgorithm. This research evaluate the efficiency of machine learning methods in intrusion detection system, together with classification tree and support vector machine, with the expect of given that reference for establishing intrusion detection system in future. Compared with further interrelated works in data mining-based intrusion detectors accuracy, detection rate, false alarm rate. It moreover show improved act than KDD Winner, particularly used for two types of attacks namely, U2R type and R2L type. Comparison results of C4.5, SVM. we finds that C4.5 is superior to SVM in accuracy and detection; in accuracy for Probe,Dos and U2R attacks, C4.5 is also better than SVM and FHRVM; but in false alarm rate FHRVM is better. In this paper enhance that FHRVM is better than c4.5 and SVM for U2R attack & R2L attack.

Key-Words / Index Term :
Classification tree, SVM, FHRVM, Internet attack, Intrusion detection system (IDS)

References :
[1] James P. Anderson, “Computer Security Threat Monitoring and Surveillance,” Technical report, James P. Anderson Co., Fort Washington, Pennsylvania. April 1980.
[2] Tomas Abraham, “IDDM: INTRUSION Detection using Data Mining Techniques”, Technical report DTSO
[3] MahbodTavallaee, IbrahimBagheri, Wei Lu, and Ali A. Ghorbanifar A Detailed Analysis of the KDD CUP 99 Data Set proceeding of the 2009 IEEE symposium on computational Intelligence in security and defense application .
[4] Xiao a Wang, Zhaohui Shi, Chongqing Wu and Wei Wang. An Improved Algorithm for Decision-Tree-Based SVM.IEEE-2006.
[5] Pang-Ming Tan, Michael Steinbach, Vidin Kumar. Introduction to data mining.Pearson Education.
[6] Liu, Y., Wang, Z., Fang, Y., &GU, H. Y. (2006). Dos intrusion detection based onincremental learning with support vector machines. Computer Engineering,
32(4), 179–186.
[7] P.Rutravigneshwaran “Intrusion Detection using Neutrosophic classifier” published in IJST Vol.2 Issue.13, Dec 2014.
[8] Peddabachigari, S., Abraham, A., Groans, C., & Thomas, J. (2007). Modeling intrusiondetection system using hybrid intelligent systems. Journal of Network andComputer Applications, 30(1), 114–132
[9] Nadiammai, Hemalatha, "Perspective analysis of machine learning algorithms for detecting network intrusions" 2012 Third International Conference onComputing Communication & Networking Technologies (ICCCNT), 2012 , Page(s): 1 - 7.
[10] Natesan,Rajesh, "Cascaded classifier approach based on Adaboost to increase detection rate of rare network attack categories" 2012 International Conference on Recent Trends In Information Technology (ICRTIT),2012 , Page(s): 417 - 422.
[11] Landwehr, Bull, McDermott, and Choi, “A taxonomy of computer program security flaws,” ACM Comput. Surv., vol. 26, no. 3, pp. 211–254, 1994.
[12] KDD Cup 1999. Available on: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html, Ocotber 2007.
13] Lippmann, Fried, Graf, Haines, Kendall, McClung, Weber, Webster, Wyschogrod, Cunningham, Zissman, “Evaluating intrusion detection systems: The 1998 darpa off-line intrusion detection evaluation,” discex, vol. 02,p. 1012, 2000.
[14] Stolfo, Fan, Lee, Prodromidis, Chan, “Costbased modeling for fraud and intrusion detection: Results from the jam project,” discex, vol. 02, p. 1130, 2000.
[15] Reda Elbasiony, Elsayed Sallam, Tarek Eltobely, Mahmoud Fahmy, "A hybrid network intrusion detection framework based on random forests and weighted k-means", Ain Shams Engineering Journal, Elsevier, 2013 4, 753–762.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.

Impact Factor

Journals Contents

Information

Downloads

Digital Certificate

Go to Navigation