Corpus ID: 6697873

Network Intrusion Detection using Clustering: A Data Mining Approach

@article{Bama2011NetworkID,
  title={Network Intrusion Detection using Clustering: A Data Mining Approach},
  author={S. Sathya Bama and Irfan Uddin Ahmed and Hindusthan},
  journal={International Journal of Computer Applications},
  year={2011},
  volume={30},
  pages={14-17}
}
Network intrusion detection system includes identifying a set of spiteful actions that compromises the basic security requirements such as integrity, confidentiality, and availability of information resources. The enormous increase in network attacks has made the data mining based intrusion detection techniques extremely useful in detecting the attacks. This paper describes a system that is able to detect the network intrusion using clustering concept. This unsupervised clustering technique for… Expand
A Comprehensive Analysis and study in Intrusion Detection System using Data Mining Techniques
TLDR
Compared zero R classifier, Decision table classifier & Random Forest classifier with KDDCUP 99 databases from MIT Lincoln Laboratory to predict the severity of attacks over the network. Expand
An evaluation of clustering technique over intrusion detection system
TLDR
Clustering algorithms like k means, hierarchical and Fuzzy C Means have been implemented to analyze the detection rate over KDD CUP 99 dataset and FCM outperforms in terms of both accuracy and computational time. Expand
Intrusion Detection Using Data Mining Technique
126 Abstract— In reality it is not possible to prevent security breaches completely using the existing security technologies. The intrusion detection plays an important role in network security andExpand
A Modified Classification Based Technique for More Accurate Classification & Prediction of the Intrusion
IDS play an important role in network security. Most of the current intrusion detection systems are signature based systems. Signature based IDS also known as misuse detection looks for a specificExpand
Anomaly Detection Using Agglomerative Hierarchical Clustering Algorithm
TLDR
The algorithm is an agglomerative hierarchical clustering algorithm which discovers outliers on the hybrid dataset with numeric and categorical attributes which is available on any network datasets. Expand
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
TLDR
According to the result of testing many procedure of data mining on KDD CUP 99, no individual procedure can reveal all attack class, with high accuracy and without false alerts, it is concluded that, various procedures should be utilized to handle several of network attacks. Expand
An Assessment Report on: Statistics-Based and Signature-Based Intrusion Detection Techniques
TLDR
A detailed study of existing IDS is presented so as to detect threats or intrusions on the data residing on system/network and statistical-based intrusion detection systems have an upper hand when it is compared with the signature- based intrusion detection system. Expand
Intrusion detection mechanism with machine learning process A case study with FMIFSSVM, FLCFSSVM, misuses SVM, anomaly SVM and Bayesian methods
TLDR
This work proposes filter based feature selection methods to predict intrusion with Feature based Mutual Information Feature Selection Support Vector Machine (FMIFSSVM), Feature based Liner Correlation Feature Selection support vector Machine (FLCFSSVM) and misuses SVM, anomaly SVM and Bayesian methods. Expand
Modernized Intrusion Detection Using Enhanced Apriori Algorithm
Communication networks are essential and it will create many crucial issues today. Nowadays, we consider that the firewalls are the first line of defense but that policies cannot meet the particularExpand
Advanced Intrusion Detection System with Prevention Capabilities
TLDR
This paper explores the details about the implementation and experimental analysis of Advanced Intrusion Detection System (AIDS) with its prevention capabilities to provide detection of known as well as unknown intrusions in the computer system and also automatic alerts are given to the network administrator for applying prevention capabilities. Expand
...
1
2
3
...

References

SHOWING 1-10 OF 18 REFERENCES
Data Mining for Intrusion Detection: From Outliers to True Intrusions
TLDR
This paper considers to add a new feature to such isolated behaviours before they can be considered as malicious, based on their possible repetition from one information system to another. Expand
Data mining for network intrusion detection : How to get started
TLDR
Based upon the experiences in getting started on this type of project, data mining techniques to consider and types of expertise and infrastructure needed are suggested. Expand
Data Mining Approaches for Intrusion Detection
TLDR
An agent-based architecture for intrusion detection systems where the learning agents continuously compute and provide the updated (detection) models to the detection agents is proposed. Expand
Real time data mining-based intrusion detection
TLDR
An overview of the research in real time data mining-based intrusion detection systems (IDS) and an architecture consisting of sensors, detectors, a data warehouse, and model generation components is presented that improves the efficiency and scalability of the IDS. Expand
Intrusion Detection and Intrusion Prevention on a Large Network: A Case Study
TLDR
The general requirements for an Intrusion Prevention and Detection System and the methods used to prevent and detect intrusions into Oak Ridge National Laboratory's network are described. Expand
Improving Security Through Analysis of Log Files Intersections
TLDR
The issues involving large-scale log processing that helps to analyze log records are discussed, and it is proposed to analyze intersections of firewall log files with application log files installed on one computer, as well as intersections resulting from firewall log Files with applicationlog files coming from different computers. Expand
A Multi-resolution Approach for Atypical Behaviour Mining
TLDR
Mrab is proposed, a self-adjusting approach intending to automatically discover atypical behaviours (in the results of a clustering algorithm) without any parameter, which is tested through a set of experiments. Expand
Data Mining: Concepts and Techniques
TLDR
This book presents dozens of algorithms and implementation examples, all in pseudo-code and suitable for use in real-world, large-scale data mining projects, and provides a comprehensive, practical look at the concepts and techniques you need to get the most out of real business data. Expand
Scalable Hierarchical Clustering Method for Sequences of Categorical Values
TLDR
This paper introduces a problem of clustering categorical data sequences and presents an efficient scalable algorithm to solve the problem and implements the general idea of agglomerative hierarchical clustering. Expand
Clustering navigation patterns on a website using a Sequence Alignment Method
In this paper, a new method is illustrated to cluster navigation patterns on a website. Instead of clustering users by means of a Euclidean distance measure, in our approach users are partitionedExpand
...
1
2
...