• Corpus ID: 15890016

An Enhanced Data Mining Based Intrusion Detection System (IDS) using Selective Feedback

@inproceedings{Adebowale2013AnED,
  title={An Enhanced Data Mining Based Intrusion Detection System (IDS) using Selective Feedback},
  author={Ajayi Adebowale and A IdowuS. and Babcock},
  year={2013}
}
Intrusion detection systems aim to identify attacks with a high detection rate and a low false alarm rate. Data mining helps in identifying implicit and sometimes long patterns in network traffic data and consequently stating valid bounds for network traffic. Classification-based data mining models for intrusion detection are often ineffective in dealing with dynamic changes in intrusion patterns and characteristics, making it imperative for them to become adaptive to the flow of traffic going… 

Tables from this paper

An Efficient Intrusion Detection System Using Improved Bias Based Convolutional Neural Network Classifier

The proposed system designed an Improved Bias based Convolutional Neural Network (ICNN) for high attack intrusion detection for large-scale intrusion dataset and evaluated in terms of accuracy, f-measure, recall, and precision for examining performance compared with existing systems.

References

SHOWING 1-10 OF 16 REFERENCES

Data Mining Approaches for Intrusion Detection

An agent-based architecture for intrusion detection systems where the learning agents continuously compute and provide the updated (detection) models to the detection agents is proposed.

A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions

This paper describes an experimental system, based on the Common Intrusion Detection Framework (CIDF), where multiple IDSs can exchange attack information to detect distributed intrusions and describes the experiences in implementing such system and the preliminary results of deploying the system in an experimental network.

The base-rate fallacy and the difficulty of intrusion detection

There are indications that at least some types of intrusion detection have far to go before they can attain such low false alarm rates, due to the base-rate fallacy phenomenon.

A detailed analysis of the KDD CUP 99 data set

A new data set is proposed, NSL-KDD, which consists of selected records of the complete KDD data set and does not suffer from any of mentioned shortcomings.

State of the Practice of Intrusion Detection Technologies

A goal of this report is to provide an unbiased assessment of publicly available ID technology and it is hoped this will help those who purchase and use ID technology to gain a realistic understanding of its capabilities and limitations.

A Software Architecture to Support Misuse Intrusion Detection

This paper presents a software architecture for structuring a pattern matching solution to misuse intrusion detection based on Colored Petri Nets, and describes the abstract classes encapsulating generic functionality and the inter-relationships between the classes.

State Transition Analysis: A Rule-Based Intrusion Detection Approach

The paper presents a new approach to representing and detecting computer penetrations in real time. The approach, called state transition analysis, models penetrations as a series of state changes

C4.5: Programs for Machine Learning

A complete guide to the C4.5 system as implemented in C for the UNIX environment, which starts from simple core learning methods and shows how they can be elaborated and extended to deal with typical problems such as missing data and over hitting.

Machine learning

Machine learning addresses many of the same research questions as the fields of statistics, data mining, and psychology, but with differences of emphasis.