An Enhanced Data Mining Based Intrusion Detection System (IDS) using Selective Feedback
@inproceedings{Adebowale2013AnED, title={An Enhanced Data Mining Based Intrusion Detection System (IDS) using Selective Feedback}, author={Ajayi Adebowale and A IdowuS. and Babcock}, year={2013} }
Intrusion detection systems aim to identify attacks with a high detection rate and a low false alarm rate. Data mining helps in identifying implicit and sometimes long patterns in network traffic data and consequently stating valid bounds for network traffic. Classification-based data mining models for intrusion detection are often ineffective in dealing with dynamic changes in intrusion patterns and characteristics, making it imperative for them to become adaptive to the flow of traffic going…
No Paper Link Available
Tables from this paper
One Citation
An Efficient Intrusion Detection System Using Improved Bias Based Convolutional Neural Network Classifier
- Computer Science
- 2021
The proposed system designed an Improved Bias based Convolutional Neural Network (ICNN) for high attack intrusion detection for large-scale intrusion dataset and evaluated in terms of accuracy, f-measure, recall, and precision for examining performance compared with existing systems.
References
SHOWING 1-10 OF 16 REFERENCES
Data Mining Approaches for Intrusion Detection
- Computer ScienceUSENIX Security Symposium
- 1998
An agent-based architecture for intrusion detection systems where the learning agents continuously compute and provide the updated (detection) models to the detection agents is proposed.
A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions
- Computer ScienceRecent Advances in Intrusion Detection
- 2000
This paper describes an experimental system, based on the Common Intrusion Detection Framework (CIDF), where multiple IDSs can exchange attack information to detect distributed intrusions and describes the experiences in implementing such system and the preliminary results of deploying the system in an experimental network.
The base-rate fallacy and the difficulty of intrusion detection
- Computer ScienceTSEC
- 2000
There are indications that at least some types of intrusion detection have far to go before they can attain such low false alarm rates, due to the base-rate fallacy phenomenon.
A detailed analysis of the KDD CUP 99 data set
- Computer Science2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications
- 2009
A new data set is proposed, NSL-KDD, which consists of selected records of the complete KDD data set and does not suffer from any of mentioned shortcomings.
State of the Practice of Intrusion Detection Technologies
- Computer Science
- 2000
A goal of this report is to provide an unbiased assessment of publicly available ID technology and it is hoped this will help those who purchase and use ID technology to gain a realistic understanding of its capabilities and limitations.
A Software Architecture to Support Misuse Intrusion Detection
- Computer Science
- 1995
This paper presents a software architecture for structuring a pattern matching solution to misuse intrusion detection based on Colored Petri Nets, and describes the abstract classes encapsulating generic functionality and the inter-relationships between the classes.
State Transition Analysis: A Rule-Based Intrusion Detection Approach
- Computer ScienceIEEE Trans. Software Eng.
- 1995
The paper presents a new approach to representing and detecting computer penetrations in real time. The approach, called state transition analysis, models penetrations as a series of state changes…
C4.5: Programs for Machine Learning
- Computer Science
- 1992
A complete guide to the C4.5 system as implemented in C for the UNIX environment, which starts from simple core learning methods and shows how they can be elaborated and extended to deal with typical problems such as missing data and over hitting.
Machine learning
- Computer ScienceCSUR
- 1996
Machine learning addresses many of the same research questions as the fields of statistics, data mining, and psychology, but with differences of emphasis.