skip to main content
10.1145/2345396.2345565acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacciciConference Proceedingsconference-collections
research-article

An evaluation of clustering technique over intrusion detection system

Published:03 August 2012Publication History

ABSTRACT

Data mining has been popularly recognized as an important way to mine useful information from large volumes of data that are noisy, fuzzy & random. Intrusion detection has become an efficient tool against network attack because they allow network administrator to detect vulnerability. Existing IDS techniques includes high false positive and false negative rate. Data mining using IDS reduces the number of false alarm rate. So, here some of the clustering algorithms like k means, hierarchical and Fuzzy C Means have been implemented to analyze the detection rate over KDD CUP 99 dataset. Based on evaluation result, FCM outperforms in terms of both accuracy and computational time.

References

  1. Anderson.J.P, "Computer Security Threat Monitoring & Surveilance", Technical Report, James P Anderson co., Fort Washington, Pennsylvania, 1980.Google ScholarGoogle Scholar
  2. Data Mining:Concepts and Techniques, 2nd Edition, Jiawei Han and Kamber,Morgan kaufman Publishers, Elsevier Inc.,2006.Google ScholarGoogle Scholar
  3. http://bus.utk.edu/stat/stat579/Hierarchical%20Clustering%20Methods.pdfGoogle ScholarGoogle Scholar
  4. http://mathworld.wolfram.com/K-MeansClusteringAlgorithm.htmlGoogle ScholarGoogle Scholar
  5. J.Allen, A. Christie, W. Fithen, J. McHugh, J. Pickel, & E. Stoner, "State of the practice of Intrusion Detection Technologies", CMU/SEI-99-TR-028, Carnegie Mellon Software Engg. Institute. 2000.Google ScholarGoogle Scholar
  6. Karypis, G. Eui-Hong Han, and Kumar, V."Chameleon: hierarchical clustering using dynamic modeling", IEEE communication proceedings, DOI: 10.1109/2.781637 Vol. 32, No.8 pp 68--75, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. KDDCup'1999dataset.http://kdd.ics.uci.edu/databases/kddcup'99/kddcup99.html.Google ScholarGoogle Scholar
  8. N.B.Annur, H. Sallehudin, A. Gani and O. Zakari. Identifying false alarm for network intrusion detection system using hybrid data mining and decision tree. Malaysian Journal of computer science, Vol.21, No.2, pp-101--115, 2008.Google ScholarGoogle Scholar
  9. N.Nagasarnya, "Potential Research into spatial cancer database by using data clustering techniques" International journal of computer science and information security, Vol. 9, No. 5, 2011.Google ScholarGoogle Scholar
  10. Richard J. Hathaway & James C. Bezdek, "Extending fuzzy and probabilistic clustering to very large datasets", Journal of Computational statistics and data analysis, vol.51, issue1, pp.215--234, Nov.2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. S.Nascimento,"A fuzzy clustering model of date & fuzzy c means", IEEE communication society.Google ScholarGoogle Scholar
  12. Sathyabama.S, Irfan Ahmed.M.S, Saravanan.A,"Network Intrusion Detection Using Clustering: A Data Mining Approach", International Journal of Computer Application (0975-8887), Vol. 30, No. 4, ISBN: 978-93-80864-87-5, DOI: 10.5120/3670-5071, 2011.Google ScholarGoogle Scholar
  13. ShengYi Jiang, Xiaoyu Song, Hui Wang, "A clustering-based method for unsupervised intrusion detections", Pattern Recognition Letters, pp- 802--810, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Shilendra Kumar, Shrivastava, Preeti Jain, "Effective Anomaly Based Intrusion Detection Using Rough Set Theory & Support Vector Machine(0975-8887), Vol.18,No.3, DOI: 10.5120/2261-2906, 2011.Google ScholarGoogle Scholar
  15. Taeshik Shon, Jong Sub Moon, "A Hybrid Machine Learning Aproach to Network Anomaly Detection", Information Sciences 2007, Vol. 177, No. 18, Publisher: USENIX Association,pp-3799--3821, ISSN:00200255,DOI:10.1016/j.ins-2007.03.025. Google ScholarGoogle ScholarCross RefCross Ref
  16. Taher Niknam,Bahman Bahmani Firouzi and Majid Nayeripour, " An Efficient Evolutionary Algorithm for Cluster Analysis", World Applied Sciences Journal Vol. 4, No.2, pp-300--307,2008.Google ScholarGoogle Scholar
  17. V.Maulik, S. Bandopadhyay, "Performance evaluation of some clustering algorithms and validity indices", IEEE transaction on Pattern Analysis and Machine Intelligence, Vol.24, No.12, pp.1650--1654, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Wenke Lee,Stolfo,Salratore Chan, "Real Time Data Mining-based Intrusion Detection", DARPA Information Survivability Conference & Exposition,2001pp-89--100,vol-1,IEEE Computer Society.Google ScholarGoogle Scholar
  19. Yang Lan,"Design and Implementation of Intrusion Detection System Based on Data Mining", Energy Procedia, vol-13, pp- 5645--5651, 2011.Google ScholarGoogle Scholar
  20. Yu-Fang Zhang, Zhong-Yang Xiong, Xiu-Qiong Wang, "DISTRIBUTED INTRUSION DETECTION BASED ON CLUSTERING", Proceedings of the Fourth International Conference on Machine Learning and Cybernetics, Guangzhou, 2005.Google ScholarGoogle Scholar
  1. An evaluation of clustering technique over intrusion detection system

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        ICACCI '12: Proceedings of the International Conference on Advances in Computing, Communications and Informatics
        August 2012
        1307 pages
        ISBN:9781450311960
        DOI:10.1145/2345396

        Copyright © 2012 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 3 August 2012

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader