Network Intrusion Detection System Using Data Mining

被引:0
|
作者
Lima de Campos, Lidio Mauro [1 ]
Limao de Oliveira, Roberto Celio [1 ]
Roisenberg, Mauro [1 ]
机构
[1] Univ Fed Para UFPA, BR-68746360 Castanhal, PA, Brazil
关键词
Datamining; Network Intrusion Detection System; Decision Tree; Neural Network; Bayesian Network; TAXONOMY;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The aim of this study is to simulate a network traffic analyzer that is part of an Intrusion Detection System - IDS, the main focus of research is data mining and for this type of application the steps that precede the data mining : data preparation (possibly involving cleaning data, data transformations, selecting subsets of records, data normalization) are considered fundamental for a good performance of the classifiers during the data mining stage. In this context, this paper discusses and presents as a contribution not only the classifiers that were used in the problem of intrusion detection, but also the initial stage of data preparation. Therefore, we tested the performance of three classifiers on the KDDCUP'99 benchmark intrusion detection dataset and selected the best classifiers. We initially tested a Decision Tree and a Neural Network using this dataset, suggesting improvements by reducing the number of attributes from 42 to 27 considering only two classes of detection, normal and intrusion. Finally, we tested the Decision Tree and Bayesian Network classifiers considering five classes of attack: Normal, DOS, U2R, R2L and Probing. The experimental results proved that the algorithms used achieved high detection rates (DR) and significant reduction of false positives (FP) for different types of network intrusions using limited computational resources.
引用
收藏
页码:104 / 113
页数:10
相关论文
共 50 条
  • [41] A real-time intrusion detection system using data mining technique
    Leu, Fang-Yie
    Hu, Kai-Wei
    INT CONF ON CYBERNETICS AND INFORMATION TECHNOLOGIES, SYSTEMS AND APPLICATIONS/INT CONF ON COMPUTING, COMMUNICATIONS AND CONTROL TECHNOLOGIES, VOL II, 2007, : 148 - 153
  • [42] An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques
    Leu, Fang-Yie
    Tsai, Kun-Lin
    Hsiao, Yi-Ting
    Yang, Chao-Tung
    IEEE SYSTEMS JOURNAL, 2017, 11 (02): : 427 - 438
  • [43] Using Data Mining Algorithms for Developing a Model for Intrusion Detection System (IDS)
    Duque, Solane
    bin Omar, Mohd Nizam
    COMPLEX ADAPTIVE SYSTEMS, 2015, 2015, 61 : 46 - 51
  • [44] Efficient Intrusion Detection System using Stream Data Mining Classification Technique
    Desale, Ketan Sanjay
    Kumathekar, Chandrakant Namdev
    Chavan, Arjun Pramod
    1ST INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION ICCUBEA 2015, 2015, : 469 - 473
  • [45] Hybrid intelligent intrusion Detection/Prevention System using fuzzylogic and data mining
    Shanmugam, Bharanidharan
    Idris, Norbik Bashah
    ECIW 2007: PROCEEDINGS OF THE 6TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2007, : 237 - 244
  • [46] A Novel Rule-based Intrusion Detection System Using Data Mining
    Li, Lei
    Yang, De-Zhang
    Shen, Fang-Cheng
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 6, 2010, : 169 - 172
  • [47] A Novel Intrusion Detection System by using Intelligent Data Mining in Weka Environment
    Mohammad, Muamer N.
    Sulaiman, Norrozila
    Muhsin, Osama Abdulkarim
    WORLD CONFERENCE ON INFORMATION TECHNOLOGY (WCIT-2010), 2011, 3
  • [48] Developing a Hybrid Intrusion Detection System Using Data Mining for Power Systems
    Pan, Shengyi
    Morris, Thomas
    Adhikari, Uttam
    IEEE TRANSACTIONS ON SMART GRID, 2015, 6 (06) : 3104 - 3113
  • [49] Effective approach toward Intrusion Detection System using data mining techniques
    Nadiammai, G. V.
    Hemalatha, M.
    EGYPTIAN INFORMATICS JOURNAL, 2014, 15 (01) : 37 - 50
  • [50] Data mining for network intrusion detection: A comparison of alternative methods
    Zhu, D
    Premkumar, G
    Zhang, XN
    Chu, CH
    DECISION SCIENCES, 2001, 32 (04) : 635 - 660