Host Based Intrusion Detection Using Data Mining Methodologies
M Naga Surya Lakshmi1 , K V N Sunitha2
Section:Research Paper, Product Type: Journal Paper
Volume-6 ,
Issue-8 , Page no. 992-998, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.992998
Online published on Aug 31, 2018
Copyright © M Naga Surya Lakshmi, K V N Sunitha . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: M Naga Surya Lakshmi, K V N Sunitha, “Host Based Intrusion Detection Using Data Mining Methodologies,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.992-998, 2018.
MLA Style Citation: M Naga Surya Lakshmi, K V N Sunitha "Host Based Intrusion Detection Using Data Mining Methodologies." International Journal of Computer Sciences and Engineering 6.8 (2018): 992-998.
APA Style Citation: M Naga Surya Lakshmi, K V N Sunitha, (2018). Host Based Intrusion Detection Using Data Mining Methodologies. International Journal of Computer Sciences and Engineering, 6(8), 992-998.
BibTex Style Citation:
@article{Lakshmi_2018,
author = {M Naga Surya Lakshmi, K V N Sunitha},
title = {Host Based Intrusion Detection Using Data Mining Methodologies},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2018},
volume = {6},
Issue = {8},
month = {8},
year = {2018},
issn = {2347-2693},
pages = {992-998},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2806},
doi = {https://doi.org/10.26438/ijcse/v6i8.992998}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i8.992998}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2806
TI - Host Based Intrusion Detection Using Data Mining Methodologies
T2 - International Journal of Computer Sciences and Engineering
AU - M Naga Surya Lakshmi, K V N Sunitha
PY - 2018
DA - 2018/08/31
PB - IJCSE, Indore, INDIA
SP - 992-998
IS - 8
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
475 | 284 downloads | 279 downloads |
Abstract
In today’s computing world there is an inconceivable growth in the usage of computers over different networks and domains, which in turn increases the security threats in terms of intrusions. An intrusion can be either internal or external and the conventional methods used in the detection of intrusion are failed to meet the necessities of preventing and detecting threats or intrusions. In this paper, Data Mining methodologies are combined to handle some of the problems like data Preparation, pre-processing of the data, data classification and Intrusion Detection. The definitive role of IDS is to recognize threats or attacks in contrast to computing schemes. The intrusion detection system is one of the vital networks shielding device or software for safeguarding computing schemes and it is capable to discover and to examine network traffic data packets. This research paper is developed situated on advanced snort rules have been developed. The main goal of this research paper is to detect fraudulent network traffic.
Key-Words / Index Term
Intrusion Detection System, Intrusion Prevention System, Snort
References
[1]. Anderson, James P., "Computer Security Threat Monitoring and Surveillance," Washing, PA, James P. Anderson Co., 1980.
[2]. Bellovin, S.M. “Network Firewalls”, IEEE Communications Magazine, Vol. 32, pp. 50- 57, 1994.
[3]. Mohammadreza Ektefa, Sara Memar, Fatimah Sidi, Lilly Suriani Affendey. Intrusion detection using data mining techniques. In: International conference on information retrieval and knowledge management; 2010. p. 200–204.
[4]. Ching-Hao, Hahn-Ming L, Devi P, Tsuhan C, Si-Yu H. Semi-supervised co-training and active learning based approach for multiview intrusion detection. In: ACM symposium on applied computing, no. 9; 2009. p. 2042– 7.
[5]. Denning, D.E. “An Intrusion-Detection Model”, in IEEE Transactions on Software Engineering, Vol.13, No. 2, pp. 222-232, 1987.
[6]. Sethuramalingam S. Hybrid feature selection for network intrusion. Int. J Computer Science Eng 2011; 3(5):1773–9.
[7]. Mchugh, J. “Intrusion and Intrusion Detection”, International Journal of Information Security, Vol. 1, No. 1, pp. 14- 35, 2001.
[8]. Prof. Ujwala Ravale, Prof. Nilesh Marathe, Prof. Puja Padiya, Feature Selection Based Hybrid Anomaly Intrusion Detection System Using K Means and RBF Kernel Function, International Conference on Advanced Computing Technologies and Applications (ICACTA- 2015), Procedia Computer Science 45 ( 2015 ) 428 – 435
[9]. Lee, W. and S. J. Stolfo, ”Data mining approaches for intrusion detection”, In Proc. of the 7th USENIX Security Symp., San Antonio, TX.USENIX, 1998
[10]. Gao Xiang, Wang Min. Applying semisupervised cluster technique for anomaly detection. In: IEEE international symposium on information processing, no. 3; 2010. p. 43–5.
[11]. Mrutyunjaya Pandaa, Ajith Abrahamb, Manas Ranjan Patrac, a*,A Hybrid Intelligent Approach for Network Intrusion Detection, International Conference on Communication Technology and System Design 2011, Procedia Engineering 30 (2012) 1 – 9
[12]. Lane T. A decision-theoretic, semi-supervised model for intrusion detection. In: International conference on machine learning and data mining for computer security; 2006. p. 157–77.
[13]. Qiang Wang, Vasileios Megalooikonomou. A clustering technique for intrusion detection. In: International conference on data mining, intrusion detection, information assurance, and data networks, security, 5(12), 2005, p. 31–8.
[14]. Li Jimin, Zhang Wei, KunLun Li. A novel semi-supervised SVM based on tri-training for intrusion detection. J Comput 2010;5(4): 638–45.
[15]. G.V. Nadiammai, M. Hemalatha. The effective approach toward Intrusion Detection System using data mining techniques In: Egyptian Informatics Journal (2014) 15, 37–50, ISSN: 1110-8665.
[16]. Ghosh, A. and Schwartzbard, A. “A Study in using Neural Networks for Anomaly and Misuse detection”, in Proceedings of the Eighth USENIX Security Symposium, Vol. 8, pp. 443-482, 1999.
[17]. Zhang Fu, Marina Papatriantafilou, Philippas Tsigas. Off-the-wall: lightweight distributed filtering to mitigate distributed denial of service attacks. In: IEEE international symposium on reliable distributed systems, no. 31; 2012. p. 207–12.
[18]. SivathaSindhu, S.S., Geetha, S. and Kannan, A. “ Decision Tree-based Light Weight Intrusion Detection using a Wrapper Approach”, in Journal of Expert Systems with Applications, Vol. 39, pp. 129-141, 2012.
[19]. Zhang Fu. Marina Papatriantafilou, Philippas Tsigas. CluB: a cluster-based framework for mitigating distributed denial of service attacks. In: ACM symposium on applied computing, no. 26; 2011. p. 520–27.
[20]. Heady, R., Luger, G., Maccabe, A., and Servilla. M. “The Architecture of a Network Level Intrusion Detection System”, Technical report, Computer Science Department, University of New Mexico, 1990.
[21]. Hesham Altwaijry, Saeed Algarny, Bayesian-based intrusion detection system, Journal of King Saud University – Computer and Information Sciences, (2012) 24, 1–6
[22]. Jian Pei, Shambhu J. Upadhyaya, Faisal Farooq, Venugopal Govindaraju. Data Mining for Intrusion Detection – Techniques, Applications, and Systems. Data Mining Techniques for Intrusion Detection and Computer Security
[23]. Zhang Fu. Marina Papatriantafilou, Philippas Tsigas, Wei Wei. Mitigating denial of capability attacks using sink tree based quota allocation. In: ACM symposium on applied computing, no. 25; 2010. p. 713–18.
[24]. Li Hanguang, Ni Yu, Intrusion Detection Technology Research Based on Apriori Technique, 2012 International Conference on Applied Physics and Industrial Engineering, Physics Procedia 24 (2012) 1615 – 1620
[25]. Zhang Fu. Marina Papatriantafilou, Philippas Tsigas. CluB: a cluster-based framework for mitigating distributed denial of service attacks. In: ACM symposium on applied computing, no. 26; 2011. p. 520–27.
[26]. Chien-Yi Chiu, Yuh-Jye Lee, Chien-Chung Chang. Semi-supervised learning for false alarm reduction. In: Industrial conference on data mining, no. 10; 2010. p. 595–605.
[27]. Neminath Hubballi, Vinoth Suryanarayanan. False alarm minimization techniques in signature-based intrusion detection systems: A survey, Computer Communications 49 (2014) 1–17
[28]. PremaRajeswari, L., and Kannan, A. “An Intrusion Detection System based on Multiple-Level Hybrid Classifier using Enhanced C4.5”, IEEE International Conference on Signal Processing, Communications and Networking, pp. 75-79, 2008.
[29]. Vincenzo Gulisano, Zhang Fu, Mar Callau- Zori, Ricardo Jim Enez-Peris, Marina Papatriantafilou, Marta Patino-Martınez. STONE: a stream-based DDoS defense framework. In: Technical report no. 2012-07, ISSN 1652-926X, Chalmers University of Technology; 2012.
[30]. Zhang Fu, Marina Papatrianta Filou, Philippas Tsigas. Mitigating distributed denial of service attacks in multiparty applications in the presence of clock drifts. IEEE Trans Depend Secure Computing 2012;9(3):401–13.
[31]. Li Jimin, Zhang Wei, KunLun Li. A novel semi-supervised SVM based on tri-training for intrusion detection. J Comput 2010;5(4): 638–45.
[32]. Monowar H. Bhuyan, Bhattacharyya DK, Kalita JK. An effective unsupervised network anomaly detection method. In: International conference on advances in computing, communications and informatics, no. 1; 2012. p. 533–9.
[33]. Catania Carlos A, Garino Carlos. Automatic network intrusion detection: current techniques and open issues. Elsevier Comput Electr Eng 2012; 38(5):1062–72.
[34]. KDD Cup99 intrusion Detection Dataset.