SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
International Journal of Innovative Research in Advanced Engineering (IJIRAE)
Volume 1 Issue 1 (March 2014)
____________________________________________________________________________________________________________
ISSN: 2278-2311 IJIRAE | http://ijirae.com
© 2014, IJIRAE- All Rights Reserved Page -21
A Study on Data Mining Based Intrusion Detection System
Anthony Raj.A
Department of computer Science,
Sri Bhagawan Mahaveer Jain College, Bangalore University
KGF Karnataka, India,Research Scholar / CSE
PRIST University, Thanjavur, INDIA
anthonyraj171@gmail.com
Abstract— In recent years security has remained unsecured for computers as well as data network systems. Intrusion detecting
system used to safeguard the data confidentiality, integrity and system availability from various types of attacks. Data mining
techniques that can be applied to intrusion detection system to detect normal and abnormal behavior patterns. This paper studies
nature of network attacks and the current trends of data mining based intrusion detection techniques.
Keywords— Data Mining, Intrusion detection system, Anomaly Detection, Supervised Learning, Classification, Support Vector
Machine
I. INTRODUCTION
Intrusions are the activities that violate the security norms of the system. An Intrusion Detection system is Mechanism used to identify,
monitor network or system actions for malicious activities and produces reports to a management departments. The development of
IDS is motivated by the following factors: Most existing systems have security was that render them susceptible to intrusions, and
finding and fixing all these deficiencies are not feasible. Prevention techniques cannot be sufficient. It is almost impossible to have an
absolutely secure system. Even the most secure systems are vulnerable to insider attacks. New intrusions continually emerge and new
techniques are needed to defend against them [1].
Data mining is a process to extracting (mining) knowledge from large amount of data.(KDD: Knowledge discovery from data ) using
computational technique and it is used for strategic decision making, wealth generation,anlyzing trends and security purpose. Data
mining overlaps with many diciplines like statistics, Machine learning, information retrieval, distributed computing. In each dicipline
approach of data mining keeps different ways. Information in Data mining process basically categorized in to two braod categories and
threse are descriptive and predictive information. In Descriptive we find pattern that human can intrepretable. In predictive information
is a process of finding a value of an attribute using value of other attributes. This paper surveys current existing trends of data mining
based intrusion detection techniuqes which are being used for intrusion detection in a data networks and internets.
II. DATA MINING BASED IDS ARCHITECTURE
The Architecture consist following major components [2], [4]
1. Sensors: Used to detect raw data on a monitored system and compute fetures for use in model evaluation
2. Detectors: Recive processed data from sensors and use detection model to evaluate the data and examine if it is an attack
International Journal of Innovative Research in Advanced Engineering (IJIRAE)
Volume 1 Issue 1 (March 2014)
____________________________________________________________________________________________________________
ISSN: 2278-2311 IJIRAE | http://ijirae.com
© 2014, IJIRAE- All Rights Reserved Page -22
3. A data warehouse: Served as centralized data source for data and models. Integrates data from multiple sensors.
4. Model Generator: Facilitates the rapid development and distribution of new or updated intrusion detection models

III. CURRENT TRENDS OF IDS TECHNIQUES
3. Signature based method:
This is the traditional mehtod for intrusion detection. It requires extensive knowldege of signature of previously known attacks. In this
process monitored events are matched with the signature to detect intrusion. Data is extrated from various different audit database and
comparing these features with to a set of attack signature provide by human expert for intrusion detection [1], [4]
3.1. Most Popular Techniques
A. Anomaly Detecion
Detects the abnormal behaviours of host or network. It stores the features of user’s usual behaviours hooked on database, and
then it compares user’s present behaviour with database. The deviation of the monitored traffic from the normal profile is
measured. [1], [4]
B. Misuse Detection
It works by searching for the traces or patterns of well-known attacks.
There are two steps to be followed:
Step one: Define abnormal system behaviour:
Step Two: Define any other behaviour, as normal behaviour.
Deviations from these rules indicate an attack on the network
3.2. Recently emerged methods from Machine learning
A. Supervised Learning-Based Approaches: Can detect known attack and pattern recognition have been utilized to detect
intrusions.
B. Unsupervised Learning-Based Approaches: Can detect the intrusions that have not been previously learned. [3]
3.3. Classification of IDS
Based on Sources of audit information IDS divided into different types [1],[5]
A. Host Based IDS: Audit data held on individual computer that serve as hosts. Intrusion detection takes place on a single host
system.
B. Network Based IDS: Network traffic considered as audit data source. Used to provide normal computing services and detect
attacks from network.
C. Distributed IDS: Gather audit data from multiple hosts that connected by the network. Used to detect attacks involving
multiple hosts
D. Hybrid intrusion Detection: It is a combination of both host-based and network-based IDS. It provides flexibility and
increases the security level.
3.4. Major Problems with Current IDS
A. Data overload: Datasource/Audit data which needs to be analysed for intrusion detection must be discrete volume/size for
efficient and effective analyze. Data overload is major problems of the Current IDS
B. False Positives : When IDS treats normal attack as malicious then it considered as False poitives
C. False Negatives: When IDS does’t generate an alert/alarm when intrusion actually taking place then it is considered as False
Negatives[1],[5]
IV. TYPES OF NETWORK ATTACKS.
A Network attack or Security or Security incident is defined as a threat, intrusion, and denial of service or other attack on a network
infrastructure that will analyze your network and gain information eventually and cause your network to crash or to become corrupted.
There are at least seven types of network attacks. [5], [6]
A. Spoofing (Identity spoofing or IP Address Spoofing)
Any internet connected device necessarily sends IP datagrams into the network. Such internet data packets carry the sender's
IP address as well as application-layer data. If the attacker obtains control over the software running on a network device,
they can then easily modify the device's protocols to place an arbitrary IP address into the data packet's source address field.
This is known as IP spoofing
B. Sniffing.
Packet sniffing is the interception of data packets traversing a network.
C. Mapping.
Before attacking a network, attackers would like to know the IP address of machines on the network, the operating systems
they use, and the services that they offer. With this information, their attacks can be more focused and are less likely to cause
alarm. The process of gathering this information is known as mapping.
International Journal of Innovative Research in Advanced Engineering (IJIRAE)
Volume 1 Issue 1 (March 2014)
____________________________________________________________________________________________________________
ISSN: 2278-2311 IJIRAE | http://ijirae.com
© 2014, IJIRAE- All Rights Reserved Page -23
D. Hijacking.
This is a technique that takes advantage of a weakness in the TCP/IP protocol stack, and the way headers are constructed.
Hijacking occurs when someone between you and the person with whom you are communicating is actively monitoring,
capturing, and controlling your communication transparently
E. Trojans.
These are programs that look like ordinary software, but actually perform unintended or malicious actions behind the scenes
when launched.
F. DoS and DDoS.
A denial of service attack is a special kind of Internet attack aimed at large websites. It is a type of attack on a network that is
designed to bring the network to its knees by flooding it with useless traffic. Denial of Service can result when a system, such
as a Web server, has been flooded with illegitimate requests, thus making it impossible to respond to real requests or taks.
G. Social engineering.
Social engineering is the use of persuasion or deception to gain access to information systems. The medium is usually a
telephone or e-mail message.
H. User to Root Attack(U2R)
The Attaker take down user level password and finally achieves root to access the system
I. Remote to User Attack(R2U)
Class of attacks where attaker sends packets to a machine over a network, then exploits machine vulnerability to illegal gain
local access as a user.
V. APPLIED DATA MINING BASED INTRUSION DETECTION TECHNIQUES
Data mining look for hidden patterns and trends in data warehouse that is not immediately apparent from summarizing the data, and
there is no query involved but use the concept interestingness criteria i.e specification of data such as Frequency,Rarity,Correlation,
Length of occurrence, Consistency, Repeating/ periodicity,abnormal behaviour, and other patters of interestingness.
The algorithms which are used for intrusion detection based on datamining techniques are listed as follows
5.1 Association rule
Association rules mining identifies association among database attribures and their values. It is a pattern-discovery technique
which does not serve to solve classification problems nor predict problems. Association rule mining requires two thresholds
i.e Minimum support and Minimum Confidence. Example: Apriori for mining Association rules Algorithm. [Agrawal and
Srikant, 1994] [1] and [2]
5.2 Classification
Classification is the process of learning a function that maps data objects to a subset of a given class set. There are two goals
of classification, First fininding a good general mapping that can predict the class of so far unkown data objectswith high
accuracy. Second to find a compact and understandable class model for each othe classes [1] and [2]
5.3 Clustering techniques
Clustering group’s data elements into different groups based on the similarity between within a single group Cluster partitions
the data set into clusters or equivalance classes. Cluster methods divided into two categories based on the cluster structure
namely Non Hierachical and Hierarchical –connection oriented. [1], [2], [3]
5.4 Decision Tree
Decision tree initially builds a tree with classification. Each node represents a binary predicate on one attribute, one branch
represents the positive instances of the predicate and the other brach represents the negative instances. Construction of
Decision Tree does not require any domain knowledge and can handle high dimensional data. [3][4]
5.5 Genetic Algorithms
Method: learning examples are stored in relational database that are represented as relational tuples. It solves the problems
with multiple solutions and easily transferred to existing models [3][4]
5.6 K Nearest Neighbour
An object classification process is achieved by the majority vote of its neighbours. The object is being assigned to the class
most common amongst its k nearest neighbours. If k=1, then the object is simply assigned to the class of its nearby neighbour.
Its Implementation taks is simple and Easy for parallel implementations.[2]
5.7 Support vector Machine
Method: A support vector machine is a classification and regression technique it constructs a hyperplane or set of hyper
planes in a high or infinite dimensional space. It is able to model complex and nonlinear decision boundaries. [4]
International Journal of Innovative Research in Advanced Engineering (IJIRAE)
Volume 1 Issue 1 (March 2014)
____________________________________________________________________________________________________________
ISSN: 2278-2311 IJIRAE | http://ijirae.com
© 2014, IJIRAE- All Rights Reserved Page -24
5.8 Neural Network
Method: A Neural Network is an adaptive system that changes its structure based on external or internal information that
flows through the network during the learning phase. Implicitly detect the complex nonlinear relationships between
dependent and independent variables. Highly tolerant the noisy data. Availability of multiple training algorithms.[3] [4]
5.9 Bayesian Method
Bayesian classifier based on the rules. It uses the joint probabilities of sample classes and observations. The algorithm tries to
estimate the conditinal probabilities of classes given an observation. Naïve Bayesian Classifier simplifies the computaions It
exhibit high accuracy and speed when applied to large databases.[4]
5.10 Fuzzy Logic
The Fuzzy logic has been used for both anomaly and misuse intrusion detection. It uses linguistic variables and allows
imprecise inputs, permits fuzzy thresholds. Rule base or Fuzzy sets easily modified.[3][4]
VI. COMPARATIVE STUDY ON APPLIED DATA MINING BASED INTRUSION DETECTION TECHNIQUES
YEAR PAPER NAME TECHNIQUE MERITS DEMERITS
Dec
2012
A Survey on Intrusion
Detection using Data
Mining Techniques [1]
I. Association rule or
Dependency Mining
II. Classification &
clustering
Used in transaction data
analysis
Applied for KDD task
Unsupervised technique
----
Feb
2013
A Review of Data
Mining based Intrusion
Detection Techniques[2]
I. Novel IDS
II. K-means Clustering
Algorithm
III. Data Dependency
weighted sequence
Mining
IV. Hybrid IDS KDD,
Anomaly Detection
Used to detect Dos Attack
Detect black hole attack
Used to filter out extra rules
generated by this appraoch
Combines the filter and
wrapper models for
selecting relevent features
Investigate more
efficient methods against
intrusions
Not reliable
Doesn’t provide sufficient
mining method
Architecture needs
to be enhanced for
improvement
Needs to be enhanced for
Cryptographic mechanism.
Required to survey more
recent techniques
April
2013
Survey paper on Data
Mining techniques of
Intrusion Detecion[3]
I. Feature Selection
II. Machine learning
III. Hybrid approach
Used on finite data set
Improve automatically
through experience
----
June
2013
A Survey on Intrusion
Detection System in
Data Mining[4]
I. Data Mining ,
Feature Selection,
Multiboosting
II. K- means clustering
Distributed IDS
Find high detection rates for
U2R and R2L and also to
detect attacks
False alarm rate has been
decreased also clustering
helps in to identify the
attacked data.
Oct
2013
A Survey: Network
Intrusion Detection
system Based on Data
Mining Techniques[5]
I. Support Vector
Machine
II. Genetic Algorithm
III. K nearest Neighbor
IV. Neural Network
V. Bayesian Method
High Accuracy solves
optimization problem
Simple and highly adaptive
behaviour
Implicitly detect the
complex nonlinear
Relationships between
dependent and independent
variables
Simplifies the computations
Exhibit high accuracy and
speed when applied to large
database
More Time space complexity
No global optimum
High Storage requirement
It requires long training time
The assumptions made in
class conditional
independence
Lack of available probability
data
International Journal of Innovative Research in Advanced Engineering (IJIRAE)
Volume 1 Issue 1 (March 2014)
____________________________________________________________________________________________________________
ISSN: 2278-2311 IJIRAE | http://ijirae.com
© 2014, IJIRAE- All Rights Reserved Page -25
VII. CONCLUSIONS
The paper showed several intrusion detection tools to uncover known and unknown attacks and to model the behaviour of the user.
The shortcomings of each tools either using independently or combining with other tool for targetting specific attacks reveals that the
outcome have other side effects or shortcomings inturn. Thre is a much research socpe involved for the research community in this
field to find the right kind of generalization of the IDS model .i.e it should not be neither too general nor too specific which is not
reliable. The challenges to find solution to the new emerging attacks with using current data mining based intrusion detecion
techniques in different fields is a new research domain
ACKNOWLEDGMENT
I Give thanks to God and Father of our Lord Jesus Christ, the merciful Father, the God from whom all help Comes! And wish to
acknowledge Dr.A.Arul L.S., my Advisor and other known & unkown research scholars for their support and sharing ideas, views in
their respective papers which really gave me an inspiration to do A Study on Data Mining Based Intrusion Detection System
REFERENCES
[1] R.Venkatesan, Dr.R.Ganeshan, Dr. A.Arul Lawrence Selvakumar “A Survey on Intrusion Detecion using Data Mining
Techniques” in International journel of Computers and Distributed System, December 2012
[2] Kamini Maheshwar and Divakar Singh “A Review of Data Mining based Intrusion Detection Techniques” in International Journal
or Innovation in Engineering & Management (IJAIEM) Feb 2013
[3] Harshna and NavneetKaur “Survey paper on Data Mining techniques of Intrusion Detecion “ in International Journal of Science,
Engineering and Technology Research (IJSETR), April 2013
[4] Sahilpreet Singh, Meenakshi Bansal “A Survey on Intrusion Detection System in Data Mining “ in International Journal of
Research in Computer Engineering & Technology (IJARCET), June 2013
[5] Subaira.A.S and Anitha.P "A Survey: Network Intrusion Detection system based on Data Mining Techniques” in International
Journal of Computer Science and Mobile Computing, October, 2013
[6] http://ayurveda.hubpages.com/hub/Types-of-Network-Attacks

Contenu connexe

Tendances

Detecting Unknown Attacks Using Big Data Analysis
Detecting Unknown Attacks Using Big Data AnalysisDetecting Unknown Attacks Using Big Data Analysis
Detecting Unknown Attacks Using Big Data AnalysisEditor IJMTER
 
An Extensive Survey of Intrusion Detection Systems
An Extensive Survey of Intrusion Detection SystemsAn Extensive Survey of Intrusion Detection Systems
An Extensive Survey of Intrusion Detection SystemsIRJET Journal
 
Comparative Analysis: Network Forensic Systems
Comparative Analysis: Network Forensic SystemsComparative Analysis: Network Forensic Systems
Comparative Analysis: Network Forensic Systemsijsrd.com
 
A Survey on Various Data Mining Technique in Intrusion Detection System
A Survey on Various Data Mining Technique in Intrusion Detection SystemA Survey on Various Data Mining Technique in Intrusion Detection System
A Survey on Various Data Mining Technique in Intrusion Detection SystemIOSRjournaljce
 
Hybrid Intrusion Detection System using Weighted Signature Generation over An...
Hybrid Intrusion Detection System using Weighted Signature Generation over An...Hybrid Intrusion Detection System using Weighted Signature Generation over An...
Hybrid Intrusion Detection System using Weighted Signature Generation over An...Editor IJMTER
 
Analysis and Design for Intrusion Detection System Based on Data Mining
Analysis and Design for Intrusion Detection System Based on Data MiningAnalysis and Design for Intrusion Detection System Based on Data Mining
Analysis and Design for Intrusion Detection System Based on Data MiningPritesh Ranjan
 
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATAREAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATAijp2p
 
Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemAffine Analytics
 
Network security using data mining concepts
Network security using data mining conceptsNetwork security using data mining concepts
Network security using data mining conceptsJaideep Ghosh
 
Optimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning AlgorithmOptimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning Algorithmijtsrd
 
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...ijcsit
 
Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques IJMER
 
A Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemAM Publications
 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi SecurityIRJET Journal
 

Tendances (19)

Detecting Unknown Attacks Using Big Data Analysis
Detecting Unknown Attacks Using Big Data AnalysisDetecting Unknown Attacks Using Big Data Analysis
Detecting Unknown Attacks Using Big Data Analysis
 
1776 1779
1776 17791776 1779
1776 1779
 
An Extensive Survey of Intrusion Detection Systems
An Extensive Survey of Intrusion Detection SystemsAn Extensive Survey of Intrusion Detection Systems
An Extensive Survey of Intrusion Detection Systems
 
Comparative Analysis: Network Forensic Systems
Comparative Analysis: Network Forensic SystemsComparative Analysis: Network Forensic Systems
Comparative Analysis: Network Forensic Systems
 
A Survey on Various Data Mining Technique in Intrusion Detection System
A Survey on Various Data Mining Technique in Intrusion Detection SystemA Survey on Various Data Mining Technique in Intrusion Detection System
A Survey on Various Data Mining Technique in Intrusion Detection System
 
Hybrid Intrusion Detection System using Weighted Signature Generation over An...
Hybrid Intrusion Detection System using Weighted Signature Generation over An...Hybrid Intrusion Detection System using Weighted Signature Generation over An...
Hybrid Intrusion Detection System using Weighted Signature Generation over An...
 
504 508
504 508504 508
504 508
 
Analysis and Design for Intrusion Detection System Based on Data Mining
Analysis and Design for Intrusion Detection System Based on Data MiningAnalysis and Design for Intrusion Detection System Based on Data Mining
Analysis and Design for Intrusion Detection System Based on Data Mining
 
Cyber forensics and auditing
Cyber forensics and auditingCyber forensics and auditing
Cyber forensics and auditing
 
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATAREAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
 
Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection system
 
Network security using data mining concepts
Network security using data mining conceptsNetwork security using data mining concepts
Network security using data mining concepts
 
Optimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning AlgorithmOptimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning Algorithm
 
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
 
Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques
 
A Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection System
 
Kx3419591964
Kx3419591964Kx3419591964
Kx3419591964
 
M0704071074
M0704071074M0704071074
M0704071074
 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi Security
 

En vedette

porto david 11012015 small
porto david 11012015 smallporto david 11012015 small
porto david 11012015 smallDavid Kurniawan
 
TS-Industries shortform ver 9 - Stamping
TS-Industries shortform ver 9 - StampingTS-Industries shortform ver 9 - Stamping
TS-Industries shortform ver 9 - StampingBrad Gulley
 
Top 5 admin officer cover letter samples
Top 5 admin officer cover letter samplesTop 5 admin officer cover letter samples
Top 5 admin officer cover letter samplesdonriferi
 
SELF AUTHENTICATION” AN APPROACH FOR PASSWORD FREE AUTHENTICATION
SELF AUTHENTICATION” AN APPROACH FOR PASSWORD FREE AUTHENTICATIONSELF AUTHENTICATION” AN APPROACH FOR PASSWORD FREE AUTHENTICATION
SELF AUTHENTICATION” AN APPROACH FOR PASSWORD FREE AUTHENTICATIONAM Publications
 
historia de la computación
historia de la computaciónhistoria de la computación
historia de la computaciónDanna Goya
 
Curriculum Vitae khani
Curriculum Vitae khaniCurriculum Vitae khani
Curriculum Vitae khaniMojtaba Khani
 
Governance officer performance appraisal
Governance officer performance appraisalGovernance officer performance appraisal
Governance officer performance appraisalBigBang789
 
A film formanyelve
A film formanyelveA film formanyelve
A film formanyelvefodz3634
 
Termoclip presentation company_2
Termoclip presentation company_2Termoclip presentation company_2
Termoclip presentation company_2Termoclip
 
JOB PROFILE -HR CONSULTANT
JOB PROFILE -HR CONSULTANTJOB PROFILE -HR CONSULTANT
JOB PROFILE -HR CONSULTANTbeverly fortuin
 
Survey on Load Rebalancing for Distributed File System in Cloud
Survey on Load Rebalancing for Distributed File System in CloudSurvey on Load Rebalancing for Distributed File System in Cloud
Survey on Load Rebalancing for Distributed File System in CloudAM Publications
 
ESDS_Corporate_Presentation
ESDS_Corporate_PresentationESDS_Corporate_Presentation
ESDS_Corporate_PresentationPravin Rahane
 

En vedette (16)

porto david 11012015 small
porto david 11012015 smallporto david 11012015 small
porto david 11012015 small
 
TS-Industries shortform ver 9 - Stamping
TS-Industries shortform ver 9 - StampingTS-Industries shortform ver 9 - Stamping
TS-Industries shortform ver 9 - Stamping
 
Top 5 admin officer cover letter samples
Top 5 admin officer cover letter samplesTop 5 admin officer cover letter samples
Top 5 admin officer cover letter samples
 
Happy mornings!
Happy mornings!Happy mornings!
Happy mornings!
 
SELF AUTHENTICATION” AN APPROACH FOR PASSWORD FREE AUTHENTICATION
SELF AUTHENTICATION” AN APPROACH FOR PASSWORD FREE AUTHENTICATIONSELF AUTHENTICATION” AN APPROACH FOR PASSWORD FREE AUTHENTICATION
SELF AUTHENTICATION” AN APPROACH FOR PASSWORD FREE AUTHENTICATION
 
Contact Solar
Contact SolarContact Solar
Contact Solar
 
DELFINES
DELFINESDELFINES
DELFINES
 
historia de la computación
historia de la computaciónhistoria de la computación
historia de la computación
 
Curriculum Vitae khani
Curriculum Vitae khaniCurriculum Vitae khani
Curriculum Vitae khani
 
Governance officer performance appraisal
Governance officer performance appraisalGovernance officer performance appraisal
Governance officer performance appraisal
 
A film formanyelve
A film formanyelveA film formanyelve
A film formanyelve
 
Termoclip presentation company_2
Termoclip presentation company_2Termoclip presentation company_2
Termoclip presentation company_2
 
140210106015
140210106015140210106015
140210106015
 
JOB PROFILE -HR CONSULTANT
JOB PROFILE -HR CONSULTANTJOB PROFILE -HR CONSULTANT
JOB PROFILE -HR CONSULTANT
 
Survey on Load Rebalancing for Distributed File System in Cloud
Survey on Load Rebalancing for Distributed File System in CloudSurvey on Load Rebalancing for Distributed File System in Cloud
Survey on Load Rebalancing for Distributed File System in Cloud
 
ESDS_Corporate_Presentation
ESDS_Corporate_PresentationESDS_Corporate_Presentation
ESDS_Corporate_Presentation
 

Similaire à A Study on Data Mining Based Intrusion Detection System

A Comprehensive Review On Intrusion Detection System And Techniques
A Comprehensive Review On Intrusion Detection System And TechniquesA Comprehensive Review On Intrusion Detection System And Techniques
A Comprehensive Review On Intrusion Detection System And TechniquesKelly Taylor
 
A Performance Analysis of Chasing Intruders by Implementing Mobile Agents
A Performance Analysis of Chasing Intruders by Implementing Mobile AgentsA Performance Analysis of Chasing Intruders by Implementing Mobile Agents
A Performance Analysis of Chasing Intruders by Implementing Mobile AgentsCSCJournals
 
A Review Of Intrusion Detection System In Computer Network
A Review Of Intrusion Detection System In Computer NetworkA Review Of Intrusion Detection System In Computer Network
A Review Of Intrusion Detection System In Computer NetworkAudrey Britton
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningeSAT Journals
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningeSAT Journals
 
Detecting Various Intrusion Attacks using A Fuzzy Triangular Membership Function
Detecting Various Intrusion Attacks using A Fuzzy Triangular Membership FunctionDetecting Various Intrusion Attacks using A Fuzzy Triangular Membership Function
Detecting Various Intrusion Attacks using A Fuzzy Triangular Membership FunctionIRJET Journal
 
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.IRJET Journal
 
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...IJNSA Journal
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
D0261019025
D0261019025D0261019025
D0261019025theijes
 
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkA Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkIOSR Journals
 
IRJET- A Review on Intrusion Detection System
IRJET-  	  A Review on Intrusion Detection SystemIRJET-  	  A Review on Intrusion Detection System
IRJET- A Review on Intrusion Detection SystemIRJET Journal
 
A combined approach to search for evasion techniques in network intrusion det...
A combined approach to search for evasion techniques in network intrusion det...A combined approach to search for evasion techniques in network intrusion det...
A combined approach to search for evasion techniques in network intrusion det...eSAT Journals
 
The Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational DatabasesThe Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational DatabasesIJRES Journal
 
Evaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chainEvaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chainIJCI JOURNAL
 
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...eSAT Publishing House
 
Defense mechanism for ddos attack through machine learning
Defense mechanism for ddos attack through machine learningDefense mechanism for ddos attack through machine learning
Defense mechanism for ddos attack through machine learningeSAT Journals
 

Similaire à A Study on Data Mining Based Intrusion Detection System (20)

Bt33430435
Bt33430435Bt33430435
Bt33430435
 
A Comprehensive Review On Intrusion Detection System And Techniques
A Comprehensive Review On Intrusion Detection System And TechniquesA Comprehensive Review On Intrusion Detection System And Techniques
A Comprehensive Review On Intrusion Detection System And Techniques
 
A Performance Analysis of Chasing Intruders by Implementing Mobile Agents
A Performance Analysis of Chasing Intruders by Implementing Mobile AgentsA Performance Analysis of Chasing Intruders by Implementing Mobile Agents
A Performance Analysis of Chasing Intruders by Implementing Mobile Agents
 
A Review Of Intrusion Detection System In Computer Network
A Review Of Intrusion Detection System In Computer NetworkA Review Of Intrusion Detection System In Computer Network
A Review Of Intrusion Detection System In Computer Network
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
 
Detecting Various Intrusion Attacks using A Fuzzy Triangular Membership Function
Detecting Various Intrusion Attacks using A Fuzzy Triangular Membership FunctionDetecting Various Intrusion Attacks using A Fuzzy Triangular Membership Function
Detecting Various Intrusion Attacks using A Fuzzy Triangular Membership Function
 
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
 
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
 
Es34887891
Es34887891Es34887891
Es34887891
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
D0261019025
D0261019025D0261019025
D0261019025
 
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkA Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
 
IRJET- A Review on Intrusion Detection System
IRJET-  	  A Review on Intrusion Detection SystemIRJET-  	  A Review on Intrusion Detection System
IRJET- A Review on Intrusion Detection System
 
A combined approach to search for evasion techniques in network intrusion det...
A combined approach to search for evasion techniques in network intrusion det...A combined approach to search for evasion techniques in network intrusion det...
A combined approach to search for evasion techniques in network intrusion det...
 
The Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational DatabasesThe Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational Databases
 
Evaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chainEvaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chain
 
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...
 
1776 1779
1776 17791776 1779
1776 1779
 
Defense mechanism for ddos attack through machine learning
Defense mechanism for ddos attack through machine learningDefense mechanism for ddos attack through machine learning
Defense mechanism for ddos attack through machine learning
 

Plus de AM Publications

DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...AM Publications
 
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...AM Publications
 
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNTHE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNAM Publications
 
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...AM Publications
 
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...AM Publications
 
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESAM Publications
 
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS AM Publications
 
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...AM Publications
 
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONHMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONAM Publications
 
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...AM Publications
 
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...AM Publications
 
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...AM Publications
 
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...AM Publications
 
OPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNOPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNAM Publications
 
DETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTDETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTAM Publications
 
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTSIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTAM Publications
 
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...AM Publications
 
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...AM Publications
 
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY AM Publications
 

Plus de AM Publications (20)

DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
 
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
 
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNTHE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
 
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
 
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
 
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
 
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
 
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
 
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONHMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
 
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
 
INTELLIGENT BLIND STICK
INTELLIGENT BLIND STICKINTELLIGENT BLIND STICK
INTELLIGENT BLIND STICK
 
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
 
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
 
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
 
OPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNOPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNN
 
DETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTDETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECT
 
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTSIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
 
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
 
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
 
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
 

Dernier

Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfChristianCDAM
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgsaravananr517913
 
BSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxBSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxNiranjanYadav41
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxVelmuruganTECE
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating SystemRashmi Bhat
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Erbil Polytechnic University
 
Industrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptIndustrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptNarmatha D
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...Erbil Polytechnic University
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm Systemirfanmechengr
 

Dernier (20)

Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdf
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
 
BSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxBSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptx
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptx
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating System
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
 
Industrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptIndustrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.ppt
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
Designing pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptxDesigning pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptx
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm System
 

A Study on Data Mining Based Intrusion Detection System

  • 1. International Journal of Innovative Research in Advanced Engineering (IJIRAE) Volume 1 Issue 1 (March 2014) ____________________________________________________________________________________________________________ ISSN: 2278-2311 IJIRAE | http://ijirae.com © 2014, IJIRAE- All Rights Reserved Page -21 A Study on Data Mining Based Intrusion Detection System Anthony Raj.A Department of computer Science, Sri Bhagawan Mahaveer Jain College, Bangalore University KGF Karnataka, India,Research Scholar / CSE PRIST University, Thanjavur, INDIA anthonyraj171@gmail.com Abstract— In recent years security has remained unsecured for computers as well as data network systems. Intrusion detecting system used to safeguard the data confidentiality, integrity and system availability from various types of attacks. Data mining techniques that can be applied to intrusion detection system to detect normal and abnormal behavior patterns. This paper studies nature of network attacks and the current trends of data mining based intrusion detection techniques. Keywords— Data Mining, Intrusion detection system, Anomaly Detection, Supervised Learning, Classification, Support Vector Machine I. INTRODUCTION Intrusions are the activities that violate the security norms of the system. An Intrusion Detection system is Mechanism used to identify, monitor network or system actions for malicious activities and produces reports to a management departments. The development of IDS is motivated by the following factors: Most existing systems have security was that render them susceptible to intrusions, and finding and fixing all these deficiencies are not feasible. Prevention techniques cannot be sufficient. It is almost impossible to have an absolutely secure system. Even the most secure systems are vulnerable to insider attacks. New intrusions continually emerge and new techniques are needed to defend against them [1]. Data mining is a process to extracting (mining) knowledge from large amount of data.(KDD: Knowledge discovery from data ) using computational technique and it is used for strategic decision making, wealth generation,anlyzing trends and security purpose. Data mining overlaps with many diciplines like statistics, Machine learning, information retrieval, distributed computing. In each dicipline approach of data mining keeps different ways. Information in Data mining process basically categorized in to two braod categories and threse are descriptive and predictive information. In Descriptive we find pattern that human can intrepretable. In predictive information is a process of finding a value of an attribute using value of other attributes. This paper surveys current existing trends of data mining based intrusion detection techniuqes which are being used for intrusion detection in a data networks and internets. II. DATA MINING BASED IDS ARCHITECTURE The Architecture consist following major components [2], [4] 1. Sensors: Used to detect raw data on a monitored system and compute fetures for use in model evaluation 2. Detectors: Recive processed data from sensors and use detection model to evaluate the data and examine if it is an attack
  • 2. International Journal of Innovative Research in Advanced Engineering (IJIRAE) Volume 1 Issue 1 (March 2014) ____________________________________________________________________________________________________________ ISSN: 2278-2311 IJIRAE | http://ijirae.com © 2014, IJIRAE- All Rights Reserved Page -22 3. A data warehouse: Served as centralized data source for data and models. Integrates data from multiple sensors. 4. Model Generator: Facilitates the rapid development and distribution of new or updated intrusion detection models  III. CURRENT TRENDS OF IDS TECHNIQUES 3. Signature based method: This is the traditional mehtod for intrusion detection. It requires extensive knowldege of signature of previously known attacks. In this process monitored events are matched with the signature to detect intrusion. Data is extrated from various different audit database and comparing these features with to a set of attack signature provide by human expert for intrusion detection [1], [4] 3.1. Most Popular Techniques A. Anomaly Detecion Detects the abnormal behaviours of host or network. It stores the features of user’s usual behaviours hooked on database, and then it compares user’s present behaviour with database. The deviation of the monitored traffic from the normal profile is measured. [1], [4] B. Misuse Detection It works by searching for the traces or patterns of well-known attacks. There are two steps to be followed: Step one: Define abnormal system behaviour: Step Two: Define any other behaviour, as normal behaviour. Deviations from these rules indicate an attack on the network 3.2. Recently emerged methods from Machine learning A. Supervised Learning-Based Approaches: Can detect known attack and pattern recognition have been utilized to detect intrusions. B. Unsupervised Learning-Based Approaches: Can detect the intrusions that have not been previously learned. [3] 3.3. Classification of IDS Based on Sources of audit information IDS divided into different types [1],[5] A. Host Based IDS: Audit data held on individual computer that serve as hosts. Intrusion detection takes place on a single host system. B. Network Based IDS: Network traffic considered as audit data source. Used to provide normal computing services and detect attacks from network. C. Distributed IDS: Gather audit data from multiple hosts that connected by the network. Used to detect attacks involving multiple hosts D. Hybrid intrusion Detection: It is a combination of both host-based and network-based IDS. It provides flexibility and increases the security level. 3.4. Major Problems with Current IDS A. Data overload: Datasource/Audit data which needs to be analysed for intrusion detection must be discrete volume/size for efficient and effective analyze. Data overload is major problems of the Current IDS B. False Positives : When IDS treats normal attack as malicious then it considered as False poitives C. False Negatives: When IDS does’t generate an alert/alarm when intrusion actually taking place then it is considered as False Negatives[1],[5] IV. TYPES OF NETWORK ATTACKS. A Network attack or Security or Security incident is defined as a threat, intrusion, and denial of service or other attack on a network infrastructure that will analyze your network and gain information eventually and cause your network to crash or to become corrupted. There are at least seven types of network attacks. [5], [6] A. Spoofing (Identity spoofing or IP Address Spoofing) Any internet connected device necessarily sends IP datagrams into the network. Such internet data packets carry the sender's IP address as well as application-layer data. If the attacker obtains control over the software running on a network device, they can then easily modify the device's protocols to place an arbitrary IP address into the data packet's source address field. This is known as IP spoofing B. Sniffing. Packet sniffing is the interception of data packets traversing a network. C. Mapping. Before attacking a network, attackers would like to know the IP address of machines on the network, the operating systems they use, and the services that they offer. With this information, their attacks can be more focused and are less likely to cause alarm. The process of gathering this information is known as mapping.
  • 3. International Journal of Innovative Research in Advanced Engineering (IJIRAE) Volume 1 Issue 1 (March 2014) ____________________________________________________________________________________________________________ ISSN: 2278-2311 IJIRAE | http://ijirae.com © 2014, IJIRAE- All Rights Reserved Page -23 D. Hijacking. This is a technique that takes advantage of a weakness in the TCP/IP protocol stack, and the way headers are constructed. Hijacking occurs when someone between you and the person with whom you are communicating is actively monitoring, capturing, and controlling your communication transparently E. Trojans. These are programs that look like ordinary software, but actually perform unintended or malicious actions behind the scenes when launched. F. DoS and DDoS. A denial of service attack is a special kind of Internet attack aimed at large websites. It is a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. Denial of Service can result when a system, such as a Web server, has been flooded with illegitimate requests, thus making it impossible to respond to real requests or taks. G. Social engineering. Social engineering is the use of persuasion or deception to gain access to information systems. The medium is usually a telephone or e-mail message. H. User to Root Attack(U2R) The Attaker take down user level password and finally achieves root to access the system I. Remote to User Attack(R2U) Class of attacks where attaker sends packets to a machine over a network, then exploits machine vulnerability to illegal gain local access as a user. V. APPLIED DATA MINING BASED INTRUSION DETECTION TECHNIQUES Data mining look for hidden patterns and trends in data warehouse that is not immediately apparent from summarizing the data, and there is no query involved but use the concept interestingness criteria i.e specification of data such as Frequency,Rarity,Correlation, Length of occurrence, Consistency, Repeating/ periodicity,abnormal behaviour, and other patters of interestingness. The algorithms which are used for intrusion detection based on datamining techniques are listed as follows 5.1 Association rule Association rules mining identifies association among database attribures and their values. It is a pattern-discovery technique which does not serve to solve classification problems nor predict problems. Association rule mining requires two thresholds i.e Minimum support and Minimum Confidence. Example: Apriori for mining Association rules Algorithm. [Agrawal and Srikant, 1994] [1] and [2] 5.2 Classification Classification is the process of learning a function that maps data objects to a subset of a given class set. There are two goals of classification, First fininding a good general mapping that can predict the class of so far unkown data objectswith high accuracy. Second to find a compact and understandable class model for each othe classes [1] and [2] 5.3 Clustering techniques Clustering group’s data elements into different groups based on the similarity between within a single group Cluster partitions the data set into clusters or equivalance classes. Cluster methods divided into two categories based on the cluster structure namely Non Hierachical and Hierarchical –connection oriented. [1], [2], [3] 5.4 Decision Tree Decision tree initially builds a tree with classification. Each node represents a binary predicate on one attribute, one branch represents the positive instances of the predicate and the other brach represents the negative instances. Construction of Decision Tree does not require any domain knowledge and can handle high dimensional data. [3][4] 5.5 Genetic Algorithms Method: learning examples are stored in relational database that are represented as relational tuples. It solves the problems with multiple solutions and easily transferred to existing models [3][4] 5.6 K Nearest Neighbour An object classification process is achieved by the majority vote of its neighbours. The object is being assigned to the class most common amongst its k nearest neighbours. If k=1, then the object is simply assigned to the class of its nearby neighbour. Its Implementation taks is simple and Easy for parallel implementations.[2] 5.7 Support vector Machine Method: A support vector machine is a classification and regression technique it constructs a hyperplane or set of hyper planes in a high or infinite dimensional space. It is able to model complex and nonlinear decision boundaries. [4]
  • 4. International Journal of Innovative Research in Advanced Engineering (IJIRAE) Volume 1 Issue 1 (March 2014) ____________________________________________________________________________________________________________ ISSN: 2278-2311 IJIRAE | http://ijirae.com © 2014, IJIRAE- All Rights Reserved Page -24 5.8 Neural Network Method: A Neural Network is an adaptive system that changes its structure based on external or internal information that flows through the network during the learning phase. Implicitly detect the complex nonlinear relationships between dependent and independent variables. Highly tolerant the noisy data. Availability of multiple training algorithms.[3] [4] 5.9 Bayesian Method Bayesian classifier based on the rules. It uses the joint probabilities of sample classes and observations. The algorithm tries to estimate the conditinal probabilities of classes given an observation. Naïve Bayesian Classifier simplifies the computaions It exhibit high accuracy and speed when applied to large databases.[4] 5.10 Fuzzy Logic The Fuzzy logic has been used for both anomaly and misuse intrusion detection. It uses linguistic variables and allows imprecise inputs, permits fuzzy thresholds. Rule base or Fuzzy sets easily modified.[3][4] VI. COMPARATIVE STUDY ON APPLIED DATA MINING BASED INTRUSION DETECTION TECHNIQUES YEAR PAPER NAME TECHNIQUE MERITS DEMERITS Dec 2012 A Survey on Intrusion Detection using Data Mining Techniques [1] I. Association rule or Dependency Mining II. Classification & clustering Used in transaction data analysis Applied for KDD task Unsupervised technique ---- Feb 2013 A Review of Data Mining based Intrusion Detection Techniques[2] I. Novel IDS II. K-means Clustering Algorithm III. Data Dependency weighted sequence Mining IV. Hybrid IDS KDD, Anomaly Detection Used to detect Dos Attack Detect black hole attack Used to filter out extra rules generated by this appraoch Combines the filter and wrapper models for selecting relevent features Investigate more efficient methods against intrusions Not reliable Doesn’t provide sufficient mining method Architecture needs to be enhanced for improvement Needs to be enhanced for Cryptographic mechanism. Required to survey more recent techniques April 2013 Survey paper on Data Mining techniques of Intrusion Detecion[3] I. Feature Selection II. Machine learning III. Hybrid approach Used on finite data set Improve automatically through experience ---- June 2013 A Survey on Intrusion Detection System in Data Mining[4] I. Data Mining , Feature Selection, Multiboosting II. K- means clustering Distributed IDS Find high detection rates for U2R and R2L and also to detect attacks False alarm rate has been decreased also clustering helps in to identify the attacked data. Oct 2013 A Survey: Network Intrusion Detection system Based on Data Mining Techniques[5] I. Support Vector Machine II. Genetic Algorithm III. K nearest Neighbor IV. Neural Network V. Bayesian Method High Accuracy solves optimization problem Simple and highly adaptive behaviour Implicitly detect the complex nonlinear Relationships between dependent and independent variables Simplifies the computations Exhibit high accuracy and speed when applied to large database More Time space complexity No global optimum High Storage requirement It requires long training time The assumptions made in class conditional independence Lack of available probability data
  • 5. International Journal of Innovative Research in Advanced Engineering (IJIRAE) Volume 1 Issue 1 (March 2014) ____________________________________________________________________________________________________________ ISSN: 2278-2311 IJIRAE | http://ijirae.com © 2014, IJIRAE- All Rights Reserved Page -25 VII. CONCLUSIONS The paper showed several intrusion detection tools to uncover known and unknown attacks and to model the behaviour of the user. The shortcomings of each tools either using independently or combining with other tool for targetting specific attacks reveals that the outcome have other side effects or shortcomings inturn. Thre is a much research socpe involved for the research community in this field to find the right kind of generalization of the IDS model .i.e it should not be neither too general nor too specific which is not reliable. The challenges to find solution to the new emerging attacks with using current data mining based intrusion detecion techniques in different fields is a new research domain ACKNOWLEDGMENT I Give thanks to God and Father of our Lord Jesus Christ, the merciful Father, the God from whom all help Comes! And wish to acknowledge Dr.A.Arul L.S., my Advisor and other known & unkown research scholars for their support and sharing ideas, views in their respective papers which really gave me an inspiration to do A Study on Data Mining Based Intrusion Detection System REFERENCES [1] R.Venkatesan, Dr.R.Ganeshan, Dr. A.Arul Lawrence Selvakumar “A Survey on Intrusion Detecion using Data Mining Techniques” in International journel of Computers and Distributed System, December 2012 [2] Kamini Maheshwar and Divakar Singh “A Review of Data Mining based Intrusion Detection Techniques” in International Journal or Innovation in Engineering & Management (IJAIEM) Feb 2013 [3] Harshna and NavneetKaur “Survey paper on Data Mining techniques of Intrusion Detecion “ in International Journal of Science, Engineering and Technology Research (IJSETR), April 2013 [4] Sahilpreet Singh, Meenakshi Bansal “A Survey on Intrusion Detection System in Data Mining “ in International Journal of Research in Computer Engineering & Technology (IJARCET), June 2013 [5] Subaira.A.S and Anitha.P "A Survey: Network Intrusion Detection system based on Data Mining Techniques” in International Journal of Computer Science and Mobile Computing, October, 2013 [6] http://ayurveda.hubpages.com/hub/Types-of-Network-Attacks