Combination of Data Mining Techniques for Intrusion Detection System

被引:0
|
作者
Elekar, Kailas Shivshankar [1 ]
机构
[1] Natl Informat Ctr, SDU, Pune, Maharashtra, India
关键词
Data Mining; Intrusion Detection System; J48; Random Forest; Random Tree;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As Internet continues to influence our day to day activities like eCommerce, eGoverence, eEducation etc. the threat from hackers has also increased. Due to which many researcher thinking intrusion detection systems as fundamental line of defense. However, many commercially available intrusion detection systems are predominantly signature-based that are designed to detect known attacks. These systems require frequent updates of signature or rules and they are not capable of detecting unknown attacks. One of the solution is use of anomaly base intrusion detection systems which are extremely effective in detecting known as well as unknown attacks. One of the major problem with anomaly base intrusion detection systems is detection of high false alarm rate. In this paper, we provide solution to increase attack detection rate while minimizing high false alarm rate by combining various data mining techniques.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Data Mining Techniques for Intrusion Detection and Prevention System
    Chalak, Ashok
    Harale, Naresh D.
    Bhosale, Rohini
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (08): : 200 - 203
  • [2] Application of Data Mining Techniques in Intrusion Detection
    Li Min
    [J]. CALL OF PAPER PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING, 2008, : 1273 - 1277
  • [3] Intrusion detection using data mining techniques
    Reddy, YB
    Guha, R
    [J]. Proceedings of the IASTED International Conference on Artificial Intelligence and Applications, Vols 1and 2, 2004, : 26 - 30
  • [4] A Comparison of Data Mining Techniques for Intrusion Detection
    Naidu, R. China Appala
    Avadhani, P. S.
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2012, : 41 - 44
  • [5] Applying Data Mining Techniques to Intrusion Detection
    Ng, Jonathon
    Joshi, Deepti
    Banik, Shankar M.
    [J]. 2015 12TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY - NEW GENERATIONS, 2015, : 800 - 801
  • [6] Intelligent Network Intrusion Detection System using Data Mining Techniques
    Sultana, Amreen
    Jabbar, M. A.
    [J]. PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2016, : 329 - 333
  • [7] Network Intrusion Detection System Using various data mining techniques
    DikshantGupta
    SuhaniSinghal
    Malik, Shamita
    Singh, Archana
    [J]. 2016 INTERNATIONAL CONFERENCE ON RESEARCH ADVANCES IN INTEGRATED NAVIGATION SYSTEMS (RAINS), 2016,
  • [8] Intrusion detection and identification system using data mining and forensic techniques
    Len, Fang-Yie
    Hu, Kai-Wei
    Jiang, Fuu-Cheng
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2007, 4752 : 137 - +
  • [9] A Novel Lightweight Hybrid Intrusion Detection Method Using a Combination of Data Mining Techniques
    Juanchaiyaphum, Jatuphum
    Arch-int, Ngamnij
    Arch-int, Somjit
    Saiyod, Saiyan
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (04): : 91 - 106
  • [10] Data warehousing and data mining techniques for intrusion detection systems
    Anoop Singhal
    Sushil Jajodia
    [J]. Distributed and Parallel Databases, 2006, 20 : 149 - 166