A Comparison of Data Mining Techniques for Intrusion Detection

被引:0
|
作者
Naidu, R. China Appala [1 ]
Avadhani, P. S. [1 ]
机构
[1] Andhra Univ, Dept CS&SE, Visakhapatnam, Andhra Pradesh, India
关键词
Intrusion Detection system; Decision Tree; Ripper Rule; Support Vector Machines;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Expositional increase in the traffic across networks has necessitated the need to detect unauthorized access. In this sense Intrusion Detection has become one of the major research areas In this paper three data mining techniques namely C5.0 Decision Tree, Ripper Rule and Support Vector Machines are studied and compared for the efficiency in detecting the Intrusion, It is found that the C5.0 Decision Tree is efficient than the other two. The data mining tool clementine is used for evaluating this on the KDD99 dataset. The results are also given in this paper.
引用
收藏
页码:41 / 44
页数:4
相关论文
共 50 条
  • [1] Application of Data Mining Techniques in Intrusion Detection
    Li Min
    [J]. CALL OF PAPER PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING, 2008, : 1273 - 1277
  • [2] Intrusion detection using data mining techniques
    Reddy, YB
    Guha, R
    [J]. Proceedings of the IASTED International Conference on Artificial Intelligence and Applications, Vols 1and 2, 2004, : 26 - 30
  • [3] Applying Data Mining Techniques to Intrusion Detection
    Ng, Jonathon
    Joshi, Deepti
    Banik, Shankar M.
    [J]. 2015 12TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY - NEW GENERATIONS, 2015, : 800 - 801
  • [4] Data warehousing and data mining techniques for intrusion detection systems
    Anoop Singhal
    Sushil Jajodia
    [J]. Distributed and Parallel Databases, 2006, 20 : 149 - 166
  • [5] Data warehousing and data mining techniques for intrusion detection systems
    Singhal, Anoop
    Jajodia, Sushil
    [J]. DISTRIBUTED AND PARALLEL DATABASES, 2006, 20 (02) : 149 - 166
  • [6] Combination of Data Mining Techniques for Intrusion Detection System
    Elekar, Kailas Shivshankar
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONTROL (IC4), 2015,
  • [7] Classification of Intrusion Detection Using Data Mining Techniques
    Sahani, Roma
    Shatabdinalini
    Rout, Chinmayee
    Badajena, J. Chandrakanta
    Jena, Ajay Kumar
    Das, Himansu
    [J]. PROGRESS IN COMPUTING, ANALYTICS AND NETWORKING, ICCAN 2017, 2018, 710 : 753 - 764
  • [8] An Overview of Intrusion Detection Based on Data Mining Techniques
    Wankhade, Kapil
    Patka, Sadia
    Thool, Ravinrda
    [J]. 2013 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2013), 2013, : 626 - 629
  • [9] Data mining for intrusion detection: Techniques, applications and systems
    Pei, H
    Upadhyaya, SJ
    Farooq, F
    Govindaraju, V
    [J]. 20TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, PROCEEDINGS, 2004, : 877 - 877
  • [10] Integrating data mining techniques with intrusion detection methods
    Mukkamala, R
    Gagnon, J
    Jajodia, S
    [J]. RESEARCH ADVANCES IN DATABASE AND INFORMATION SYSTEMS SECURITY, 2000, 43 : 33 - 46