A Comparative Review on the Performance of Intrusion Detection Algorithms and Datasets in Networks Using Data Mining Techniques
Ramakant Soni1 , Pradeep Singh Shekhawat2
- Department of Computer Science, B. K. Birla Institute of Engineering & Technology, RTU, Pilani, Rajasthan, India.
- Department of Computer Science, B. K. Birla Institute of Engineering & Technology, RTU, Pilani, Rajasthan, India.
Section:Review Paper, Product Type: Journal Paper
Volume-6 ,
Issue-3 , Page no. 327-332, Mar-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i3.327332
Online published on Mar 30, 2018
Copyright © Ramakant Soni, Pradeep Singh Shekhawat . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Ramakant Soni, Pradeep Singh Shekhawat, “A Comparative Review on the Performance of Intrusion Detection Algorithms and Datasets in Networks Using Data Mining Techniques,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.327-332, 2018.
MLA Style Citation: Ramakant Soni, Pradeep Singh Shekhawat "A Comparative Review on the Performance of Intrusion Detection Algorithms and Datasets in Networks Using Data Mining Techniques." International Journal of Computer Sciences and Engineering 6.3 (2018): 327-332.
APA Style Citation: Ramakant Soni, Pradeep Singh Shekhawat, (2018). A Comparative Review on the Performance of Intrusion Detection Algorithms and Datasets in Networks Using Data Mining Techniques. International Journal of Computer Sciences and Engineering, 6(3), 327-332.
BibTex Style Citation:
@article{Soni_2018,
author = {Ramakant Soni, Pradeep Singh Shekhawat},
title = {A Comparative Review on the Performance of Intrusion Detection Algorithms and Datasets in Networks Using Data Mining Techniques},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2018},
volume = {6},
Issue = {3},
month = {3},
year = {2018},
issn = {2347-2693},
pages = {327-332},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1803},
doi = {https://doi.org/10.26438/ijcse/v6i3.327332}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i3.327332}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1803
TI - A Comparative Review on the Performance of Intrusion Detection Algorithms and Datasets in Networks Using Data Mining Techniques
T2 - International Journal of Computer Sciences and Engineering
AU - Ramakant Soni, Pradeep Singh Shekhawat
PY - 2018
DA - 2018/03/30
PB - IJCSE, Indore, INDIA
SP - 327-332
IS - 3
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
748 | 451 downloads | 266 downloads |
Abstract
In today’s world where everything relies on the networks, the data in transfer may be susceptible to outside attacks. And these attacks are vulnerable because the data is huge in size and critical or may be confidential in nature. Due to this it becomes the prime activity to protect the information and the system processing this huge amount of information from the unauthorized access and theft. And this makes the role of Intrusion detection system very important as this helps in the protection of Confidentiality and maintenance of the integrity and reliability of the information. A number of methods are present and being used to their limits for the protection. Data mining techniques are used for the purpose of pattern extraction and analysis of the attack patterns helps in developing better system for the network. After the review of a number of data mining algorithms for clustering, classifications and classification via clustering (CvC) the conclusion is that CvC algorithm shows the best performance in intrusion detection. In the review datasets like KDDcup 99, NSL_KDD, GureKDD and Kyoto 2006+ is discussed with their performance and results for analysis.
Key-Words / Index Term
Intrusion, IDS, ID3, C4.5, Classification, Decision Tree, Clustering, Pruning, Classification via Clustering
References
[1] W. Pu, W. Jun-qing, “Intrusion Detection System with the Data Mining Technologies”, In the Proceedings of the 2011 IEEE International Conference on Communication Software and Networks (ICCSN), China, 2011, ISBN: 978-1-61284-486-2.
[2] S. K. Sahu, S. Sarangi, S. K. Jena, “A Detail Analysis on Intrusion Detection Datasets”, In the Proceedings of the 2014 IEEE International Advance Computing Conference (IACC), India, 2014, ISBN: 978-1-4799-2572-8.
[3] N. G. Relan D. R. Patil, “Implementation of Network Intrusion Detection System Using Variant of Decision Tree Algorithm”, In the Proceedings of the 2015 IEEE International Conference on Nascent Technologies in the Engineering Field (ICNTE),India, 2015, ISBN: 978-1-4799-7263-0.
[4] G. Kayacik, A. N. Zincir-Heywood, M. I. Heywood. “Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99 Intrusion Detection Datasets”, In the Proceedings of the 2005 IEEE Annual conference on privacy, security and trust, Canada, 2005.
[5] M. Kumar, M. Hanumanthappa, T. V. Suresh Kumar. “Intrusion Detection System Using Decision Tree Algorithm”, In the Proceedings of the 2012 IEEE International Conference on Communication Technology (ICCT), China, 2012, ISBN: 978-1-4673-2101-3.
[6] Wang, B. Chen, “Intrusion Detection System Based On Multi-Strategy Pruning Algorithm of the Decision Tree”, In the Proceedings of the 2013 IEEE International Conference on Grey Systems and Intelligent Services, China, 2013, ISBN: 978-1-4673-5248-2.
[7] N. M. Prajapati, A. Mishra, P. Bhanodia, “Literature Survey- IDS for Ddos Attacks”, In the Proceedings of the Conference on IT in Business, Industry and Government (CSIBIG), India, 2014, ISBN: 978-1-4799-3064-7.
[8] G. Zhai, C. Liu, “Research and Improvement on ID3 Algorithm in Intrusion Detection System”, In the Proceedings of the 2010 IEEE International Conference on Natural Computation (ICNC), China, 2010, ISBN: 978-1-4244-5961-2.
[9] Thakur, N. Markandaiah, D. S. Raj. “Re- Optimization of ID3 and C4. 5 Decision Tree”, In the Proceedings of the 2010 IEEE International Conference on Computer and Communication Technology (ICCCT), India, 2010, ISBN: 978-1-4244-9034-9.
[10] A.P. Muniyandi, R. Rajeswari, R. Rajaram, “Network Anomaly Detection by Cascading K-Means Clustering and C4. 5 Decision Tree Algorithm”, Procedia Engineering, Vol. 30, pp. 174-182, 2012.
[11] P. Aggarwal, S. K. Sharma, “An Empirical Comparison of Classifiers to Analyze Intrusion Detection”, In the Proceedings of the 2015 IEEE International Conference on Advanced Computing Communication Technologies (ACCT), India, 2015, ISBN: 978-1-4799-8488-6.
[12] Y. J. Zhao, M. J. Wei, J. Wang “Realization of Intrusion Detection System Based on the Improved Data Mining Technology”, In the Proceedings of the 2013 IEEE International Conference on Computer Science Education (ICCSE), Sri Lanka, 2013, ISBN: 978-1-4673-4463-0.
[13] K. S. Elekar, “Combination of data mining techniques for intrusion detection system”, In the Proceedings of the 2015 IEEE International Conference on Computer, Communication and Control. IEEE, India, 2015, ISBN: 978-1-4799-8164-9.
[14] S. Sahu, B. M. Mehtre, “Network Intrusion Detection System Using J48 Decision Tree”, In the Proceedings of the 2015 IEEE International Conference on Advances in Computing, Communications and Informatics (ICACCI), India, 2015, ISBN: 978-1-4799-8792-4.
[15] M. V. Kotpalliwar, R. Wajgi, “Classification of Attacks Using Support Vector Machine (SVM) on KDDCUP` 99 IDS Database”, In the Proceedings of the 2015 IEEE International Conference on Communication Systems and Network Technologies (CSNT), India, 2015, ISBN: 978-1-4799-1797-6.
[16] Marie Fernandes , "Data Mining: A Comparative Study of its Various Techniques and its Process", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.1, pp.19-23, 2017 .
[17] Kruegel, F. Valeur, G. Vigna, “Intrusion Detection and Correlation: Challenges and Solutions”, Springer Science and Business Media, Inc. Boston, 2005, ISBN: 978-0-387-23399-4.
[18] Z. Muda, W. Yassin, M. N. Sulaiman, N. I. Udzir, “Intrusion Detection Based on K Means Clustering and Naïve Bayes Classification”, In the Proceedings of the 2011 IEEE International Conference on Information Technology in Asia (CITA 11), Malaysia,pp.1-6, 2011, ISBN: 978-1-61284-130-4.
[19] U. Bashir, M. Chachoo, “Intrusion Detection and Prevention System: Challenges and Opportunities”, In the Proceedings of the 2014 IEEE International Conference on Computing for Sustainable Global Development (INDIACom), India, 2014, ISBN: 978-93-80544-12-0.
[20] M. Padmadas, N. Krishnan, J. Kanchana, M. Karthikeyan, “Layered Approach for Intrusion Detection Systems Based Genetic Algorithm”, In the Proceedings of the 2013 IEEE International Conference on Computational Intelligence and
Computing Research (ICCIC). India, 2013, ISBN: 978-1-4799-1597-2.
[21] M. Aslahi-Shahri, R. Rahmani, M. Chizari, A. Maralani, M. Eslami, M. J. Golkar, A. Ebrahimi, "A Hybrid Method Consisting of GA and SVM for Intrusion Detection System", Neural Computing and Applications, Vol. 27, 2016, p.p. 1669–1676.
[22] S. B. Kotsiantis, “Decision Trees: A Recent Overview”, Artificial Intelligence Review, Vol. 39, 2013, p.p. 261–283.
[23] S. Sathyamoorthy, "Data Mining and Information Security in Big Data", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.3, pp.86-91, 2017.
[24] Zhang, M. Zulkernine, A. Haque, “Random-Forests-Based Network Intrusion Detection Systems”, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), Vol. 38, 2008.
[25] M. Tavallaee, E. Bagheri, W. Lu, A. A. Ghorbani , “A Detailed Analysis of the KDD CUP 99 Data Set”, IEEE Symposium on Computational Intelligence for Security and Defense Applications, Canada, 2009, ISSN: 2329-6267.
[26] R. Kumar, "A Review of Network Intrusion Detection System using Machine Learning Algorithms", International Journal of Computer Sciences and Engineering (IJCSE), Vol. 5, Issue-12, p.p. 94-100, 2017