Developing Data Mining Techniques for Intruder Detection in Network Traffic

被引:3
|
作者
Agrawal, Amar [1 ]
Mohammed, Sabah [1 ]
Fiaidhi, Jinan [1 ]
机构
[1] Lakehead Univ, Dept Comp Sci, Thunder Bay, ON, Canada
关键词
Intrusion Detection System; Data Mining; Hybrid IDS;
D O I
10.14257/ijsia.2016.10.8.29
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we have proposed a hybrid intrusion detection system consisting of a misuse detection model based upon a Binary Tree of Classifiers as the first stage and an anomaly detection model based upon SVM Classifier as the second stage. The Binary Tree consists of several best known classifiers specialized in detecting specific attacks at a high level of accuracy. Combination of a Binary Tree and specialized classifiers will increase accuracy of the misuse detection model. The misuse detection model will detect only known attacks. In-order to detect unknown attacks, we have an anomaly detection model as the second stage. SVM has been used, since it's the best known classifier for anomaly detection which will detect patterns that deviate from normal behavior. The proposed hybrid intrusion detection has been tested and evaluated using KDD Cup '99, NSL-KDD and UNSW-NB15 dataset.
引用
收藏
页码:335 / 342
页数:8
相关论文
共 50 条
  • [1] Hybrid Approach for Detection of Anomaly Network Traffic using Data Mining Techniques
    Agarwal, Basant
    Mittal, Namita
    [J]. 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING & SECURITY [ICCCS-2012], 2012, 1 : 996 - 1003
  • [2] ENSEMBLE TECHNIQUE FOR INTRUDER DETECTION IN NETWORK TRAFFIC
    Agrawal, Amar
    Mohammed, Sabah
    Fiaidhi, Jinan
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2019, 13 (03): : 1 - 8
  • [3] Data Analysis to Uncover Intruder Attacks using Data Mining Techniques
    Nazir, Saima
    Ghazanfar, Mustansar Ali
    Aljohani, Naif Radi
    Azam, Muhammad Awais
    Alowibdi, Jalal S.
    [J]. 2017 5TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOIC7), 2017,
  • [4] MINING NETWORK TRAFFIC DATA
    Trajkovic, Ljiljana
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND INTELLIGENT SYSTEMS, PROCEEDINGS, VOL 1, 2009, : 1 - 2
  • [5] Data mining network traffic
    Lee, Ian W. C.
    Fapojuwo, Abraham O.
    [J]. 2006 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-5, 2006, : 170 - +
  • [6] The Key Techniques of the Network Anomaly Detection Based on Data Mining
    He Xiaobo
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS RESEARCH AND MECHATRONICS ENGINEERING, 2015, 121 : 1896 - 1899
  • [7] AN INTELLIGENT NETWORK INTRUSION DETECTION USING DATA MINING TECHNIQUES
    Shukran, Mohd Afizi Mohd
    Maskat, Kamaruzaman
    [J]. JURNAL TEKNOLOGI, 2015, 76 (12): : 127 - 131
  • [8] Intelligent Network Intrusion Detection System using Data Mining Techniques
    Sultana, Amreen
    Jabbar, M. A.
    [J]. PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2016, : 329 - 333
  • [9] Network Intrusion Detection System Using various data mining techniques
    DikshantGupta
    SuhaniSinghal
    Malik, Shamita
    Singh, Archana
    [J]. 2016 INTERNATIONAL CONFERENCE ON RESEARCH ADVANCES IN INTEGRATED NAVIGATION SYSTEMS (RAINS), 2016,
  • [10] Approach Research on the Techniques for Network Intrusion Detection Based on Data Mining
    Gong Lina
    Xu Tao
    Zhang Wei
    Li XuHong
    Wang Xia
    Pan Wenwen
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON APPLIED SCIENCE AND ENGINEERING INNOVATION, 2015, 12 : 2133 - 2136