ABSTRACT
Data mining has been popularly recognized as an important way to mine useful information from large volumes of data that are noisy, fuzzy & random. Intrusion detection has become an efficient tool against network attack because they allow network administrator to detect vulnerability. Existing IDS techniques includes high false positive and false negative rate. Data mining using IDS reduces the number of false alarm rate. So, here some of the clustering algorithms like k means, hierarchical and Fuzzy C Means have been implemented to analyze the detection rate over KDD CUP 99 dataset. Based on evaluation result, FCM outperforms in terms of both accuracy and computational time.
- Anderson.J.P, "Computer Security Threat Monitoring & Surveilance", Technical Report, James P Anderson co., Fort Washington, Pennsylvania, 1980.Google Scholar
- Data Mining:Concepts and Techniques, 2nd Edition, Jiawei Han and Kamber,Morgan kaufman Publishers, Elsevier Inc.,2006.Google Scholar
- http://bus.utk.edu/stat/stat579/Hierarchical%20Clustering%20Methods.pdfGoogle Scholar
- http://mathworld.wolfram.com/K-MeansClusteringAlgorithm.htmlGoogle Scholar
- J.Allen, A. Christie, W. Fithen, J. McHugh, J. Pickel, & E. Stoner, "State of the practice of Intrusion Detection Technologies", CMU/SEI-99-TR-028, Carnegie Mellon Software Engg. Institute. 2000.Google Scholar
- Karypis, G. Eui-Hong Han, and Kumar, V."Chameleon: hierarchical clustering using dynamic modeling", IEEE communication proceedings, DOI: 10.1109/2.781637 Vol. 32, No.8 pp 68--75, 2002. Google ScholarDigital Library
- KDDCup'1999dataset.http://kdd.ics.uci.edu/databases/kddcup'99/kddcup99.html.Google Scholar
- N.B.Annur, H. Sallehudin, A. Gani and O. Zakari. Identifying false alarm for network intrusion detection system using hybrid data mining and decision tree. Malaysian Journal of computer science, Vol.21, No.2, pp-101--115, 2008.Google Scholar
- N.Nagasarnya, "Potential Research into spatial cancer database by using data clustering techniques" International journal of computer science and information security, Vol. 9, No. 5, 2011.Google Scholar
- Richard J. Hathaway & James C. Bezdek, "Extending fuzzy and probabilistic clustering to very large datasets", Journal of Computational statistics and data analysis, vol.51, issue1, pp.215--234, Nov.2006. Google ScholarDigital Library
- S.Nascimento,"A fuzzy clustering model of date & fuzzy c means", IEEE communication society.Google Scholar
- Sathyabama.S, Irfan Ahmed.M.S, Saravanan.A,"Network Intrusion Detection Using Clustering: A Data Mining Approach", International Journal of Computer Application (0975-8887), Vol. 30, No. 4, ISBN: 978-93-80864-87-5, DOI: 10.5120/3670-5071, 2011.Google Scholar
- ShengYi Jiang, Xiaoyu Song, Hui Wang, "A clustering-based method for unsupervised intrusion detections", Pattern Recognition Letters, pp- 802--810, 2006. Google ScholarDigital Library
- Shilendra Kumar, Shrivastava, Preeti Jain, "Effective Anomaly Based Intrusion Detection Using Rough Set Theory & Support Vector Machine(0975-8887), Vol.18,No.3, DOI: 10.5120/2261-2906, 2011.Google Scholar
- Taeshik Shon, Jong Sub Moon, "A Hybrid Machine Learning Aproach to Network Anomaly Detection", Information Sciences 2007, Vol. 177, No. 18, Publisher: USENIX Association,pp-3799--3821, ISSN:00200255,DOI:10.1016/j.ins-2007.03.025. Google ScholarCross Ref
- Taher Niknam,Bahman Bahmani Firouzi and Majid Nayeripour, " An Efficient Evolutionary Algorithm for Cluster Analysis", World Applied Sciences Journal Vol. 4, No.2, pp-300--307,2008.Google Scholar
- V.Maulik, S. Bandopadhyay, "Performance evaluation of some clustering algorithms and validity indices", IEEE transaction on Pattern Analysis and Machine Intelligence, Vol.24, No.12, pp.1650--1654, 2002. Google ScholarDigital Library
- Wenke Lee,Stolfo,Salratore Chan, "Real Time Data Mining-based Intrusion Detection", DARPA Information Survivability Conference & Exposition,2001pp-89--100,vol-1,IEEE Computer Society.Google Scholar
- Yang Lan,"Design and Implementation of Intrusion Detection System Based on Data Mining", Energy Procedia, vol-13, pp- 5645--5651, 2011.Google Scholar
- Yu-Fang Zhang, Zhong-Yang Xiong, Xiu-Qiong Wang, "DISTRIBUTED INTRUSION DETECTION BASED ON CLUSTERING", Proceedings of the Fourth International Conference on Machine Learning and Cybernetics, Guangzhou, 2005.Google Scholar
- An evaluation of clustering technique over intrusion detection system
Recommendations
A Hybrid Network Intrusion Detection Technique Using Random Forests
ARES '06: Proceedings of the First International Conference on Availability, Reliability and SecurityIntrusion detection is important in network security. Most current network intrusion detection systems (NIDSs) employ either misuse detection or anomaly detection. However, misuse detection cannot detect unknown intrusions, and anomaly detection usually ...
Performance Analysis of Tree Based Classification Algorithms for Intrusion Detection System
MIKE 2013: Proceedings of the First International Conference on Mining Intelligence and Knowledge Exploration - Volume 8284Intruders attack both commercial and corporate distributed systems successfully. The problem of intruders has become vital. The most effective resistance today is the use of Intrusion Detection Systems. An intrusion detection system analysis all aspects ...
Virtual machine monitor-based lightweight intrusion detection
As virtualization technology gains in popularity, so do attempts to compromise the security and integrity of virtualized computing resources. Anti-virus software and firewall programs are typically deployed in the guest virtual machine to detect ...
Comments