Analysis of KDD CUP 99 Dataset using Clustering based Data Mining

@article{Siddiqui2013AnalysisOK,
  title={Analysis of KDD CUP 99 Dataset using Clustering based Data Mining},
  author={Mohammad Khubeb Siddiqui and Shams Naahid},
  journal={International journal of database theory and application},
  year={2013},
  volume={6},
  pages={23-34}
}
The KDD Cup 99 dataset has been the point of attraction for many researchers in the field of intrusion detection from the last decade. [...] Key Method Analysis of data is performed using k-means clustering; we have used the Oracle 10g data miner as a tool for the analysis of dataset and build 1000 clusters to segment the 494,020 records. The investigation revealed many interesting results about the protocols and attack types preferred by the hackers for intruding the networks. Keyword: KDD 99 dataset…Expand
Computational method to prove efficacy of datasets
TLDR
Results prove that WSN-DS dataset outperforms with an accuracy of 99.64% than the NSL-KDD dataset and KDD-Cup99 dataset, thus making it one of the best dataset available in the market. Expand
Statistical analysis of CIDDS-001 dataset for Network Intrusion Detection Systems using Distance-based Machine Learning
Abstract A lot of research is being done on the development of effective Network Intrusion Detection Systems. Anomaly based Network Intrusion Detection Systems are preferred over Signature basedExpand
On evaluation of Network Intrusion Detection Systems: Statistical analysis of CIDDS-001 dataset using Machine Learning Techniques
TLDR
A detailed analysis of CIDDS-001 dataset has been done and Eminent evaluation metrics including Detection Rate, Accuracy, False Positive Rate, Kappa statistics, Root mean squared error have been used to show the performance of employed machine learning techniques. Expand
Network intrusion detection system using various data mining techniques
TLDR
This research paper includes the implementation of different data mining algorithms including Linear regression and K-Means Clustering to automatically generate the rules for classify network activities to protect the data's confidentiality and integrity. Expand
A Comparative Analysis of Different Classification Techniques for Intrusion Detection System
TLDR
Data mining techniques are used for intrusion detection to identify normal and malicious actions on the system to recognize attacks by their peculiar effects without raising too many false alarms. Expand
Clustering Approach Based on Mini Batch Kmeans for Intrusion Detection System Over Big Data
TLDR
This paper proposes a clustering method for IDS based on Mini Batch <inline-formula> <tex-math notation="LaTeX">$K$ </tex- Math>-means combined with principal component analysis, and chooses the Calsski Harabasz indicator so that the clustering result is more easily determined. Expand
Global and local clustering soft assignment for intrusion detection system: a comparative study
TLDR
This research compares the classification performance between the global and local clustering approaches and the soft assignment approach is used for indexing on KDD input and SVM for classification. Expand
A Comparative Evolution of Unsupervised Techniques for Effective Network Intrusion Detection in Hadoop
TLDR
A new parallel K-medoid clustering method and k-nearest neighbor classification techniques are proposed for intrusion detection for huge amount of data and the performance is evaluated using accuracy, precision and confusion matrix. Expand
Analysis of NSL-KDD Dataset for Fuzzy Based Intrusion Detection System
TLDR
A methodology for data preprocessing towards an intrusion detection system and Microsoft excel was used in the process and this work serves as a foundation to a fuzzy logic based intrusion Detection system. Expand
UTTAMA: An Intrusion Detection System Based on Feature Clustering and Feature Transformation
TLDR
The importance of proposed approach is that the accuracy achieved using proposed approach outperforms CLAPP, CANN, SVM, KNN and other existing classifiers. Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 25 REFERENCES
A detailed analysis of the KDD CUP 99 data set
TLDR
A new data set is proposed, NSL-KDD, which consists of selected records of the complete KDD data set and does not suffer from any of mentioned shortcomings. Expand
ON THE KDD'99 DATASET: STATISTICAL ANALYSIS FOR FEATURE SELECTION
We present a contribution to the network intrusion detection process using Adaptive Resonance Theory (ART1), a type of Artifi- cial Neural Networks (ANN) with binary input unsupervised training. InExpand
Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99
TLDR
To substantiate the performance of machine learning based detectors that are trained on KDD 99 training data, the relevance of each feature is investigated and information gain is employed to determine the most discriminating features for each class. Expand
Adaptive Network Intrusion Detection Learning: Attribute Selection and Classification
In this paper, a new learning approach for network intrusion detection using naive Bayesian classifier and ID3 algorithm is presented, which identifies effective attributes from the training dataset,Expand
A Scalable Clustering Technique for Intrusion Signature Recognition
ISBN 0-7803-9814-9/$10.00 © 2001 IEEE 1 Abstract-This paper presents a data mining algorithm, namely Clustering and Classification Algorithm – Supervised (CCA-S), which we developed for detectingExpand
Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection
TLDR
This paper applies one of the efficient data mining algorithms called random forests algorithm in anomaly based NIDSs, and presents the modification on the outlier detection algorithm of random forests that is comparable to previously reported unsupervised anomaly detection approaches evaluated over the KDD' 99 dataset. Expand
Real time data mining-based intrusion detection
TLDR
An overview of the research in real time data mining-based intrusion detection systems (IDS) and an architecture consisting of sensors, detectors, a data warehouse, and model generation components is presented that improves the efficiency and scalability of the IDS. Expand
Attack Classification Based on Data Mining Technique and Its Application for Reliable Medical Sensor Communication
TLDR
A real-time intrusion detection system based on SOM that groups similar data and visualize their clusters that labels the map produced by SOM using correlations between features and yields the reasonable misclassification rates. Expand
Data Mining for Intrusion Detection: From Outliers to True Intrusions
TLDR
This paper considers to add a new feature to such isolated behaviours before they can be considered as malicious, based on their possible repetition from one information system to another. Expand
Data Clustering for Anomaly Detection in Network Intrusion Detection
TLDR
The Kmeans algorithm was chosen to evaluate the performance of an unsupervised learning method for anomaly detection using the Kdd Cup 1999 network data set and it was found that a high detection rate can be achieve while maintaining a low false alarm rate. Expand
...
1
2
3
...