Open Access   Article Go Back

Intrusion Detection and Prevention System to Increase the Detection Rate Using Data Mining Technique

Susheel Kumar Tiwari1 , Chandikaditya Kumawat2 , Manish Shrivastava3

Section:Review Paper, Product Type: Journal Paper
Volume-6 , Issue-10 , Page no. 617-620, Oct-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i10.617620

Online published on Oct 31, 2018

Copyright © Susheel Kumar Tiwari, Chandikaditya Kumawat, Manish Shrivastava . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Susheel Kumar Tiwari, Chandikaditya Kumawat, Manish Shrivastava, “Intrusion Detection and Prevention System to Increase the Detection Rate Using Data Mining Technique,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.617-620, 2018.

MLA Style Citation: Susheel Kumar Tiwari, Chandikaditya Kumawat, Manish Shrivastava "Intrusion Detection and Prevention System to Increase the Detection Rate Using Data Mining Technique." International Journal of Computer Sciences and Engineering 6.10 (2018): 617-620.

APA Style Citation: Susheel Kumar Tiwari, Chandikaditya Kumawat, Manish Shrivastava, (2018). Intrusion Detection and Prevention System to Increase the Detection Rate Using Data Mining Technique. International Journal of Computer Sciences and Engineering, 6(10), 617-620.

BibTex Style Citation:
@article{Tiwari_2018,
author = {Susheel Kumar Tiwari, Chandikaditya Kumawat, Manish Shrivastava},
title = {Intrusion Detection and Prevention System to Increase the Detection Rate Using Data Mining Technique},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2018},
volume = {6},
Issue = {10},
month = {10},
year = {2018},
issn = {2347-2693},
pages = {617-620},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3071},
doi = {https://doi.org/10.26438/ijcse/v6i10.617620}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i10.617620}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3071
TI - Intrusion Detection and Prevention System to Increase the Detection Rate Using Data Mining Technique
T2 - International Journal of Computer Sciences and Engineering
AU - Susheel Kumar Tiwari, Chandikaditya Kumawat, Manish Shrivastava
PY - 2018
DA - 2018/10/31
PB - IJCSE, Indore, INDIA
SP - 617-620
IS - 10
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
1547 242 downloads 185 downloads
  
  
           

Abstract

Intrusion Detection Systems are used to monitor computer system for sign of security violations over network or cloud environment. On detection of such sign triggers of IDSs is to report them to generate the alerts. These alerts are presented to a human analyst or user who evaluates the alerts and initiates an adequate response. In Practice, IDSs have been observed to trigger thousands of alerts per day, most of which are mistakenly triggered by begin events such as false positive. This makes it extremely difficult for the analyst to correctly identify alerts related to attack such as a true positive. Recently Data Mining methods have gained importance in addressing network or cloud security issues, including network intrusion detection and cloud Intrusion detection systems, these systems aim to identify attacks with a high detection rate and a low false alarm rate. Consequently, Unsupervised Learning methods have been given a closer look for network and cloud intrusion detection. We present unsupervised based Clustering Technique and compare with traditional centroid-based clustering algorithms for intrusion detection. These techniques are applied to the KDD Cup98 data set .In addition; a Comparative analysis shows the advantage of proposed approach over Traditional clustering-based Methods over in identifying new or unseen attack. Experimental result show that A.I based Hill Climbing aided k-means Clustering algorithm improves the detection rate in IDS than K-Mean algorithm and achieved 92% detection rate in IDS System.

Key-Words / Index Term

Intrusion Detection, AI, Clustering

References

[1] Tich Phu oc Tran, “Machine Learning and Data Mining: Introduction to Principles and Algorithms”, Horwood Publishing Limited, 2007.
[2] Ye Yuan, "Mining Audit Data to Build Intrusion Detection Models," Proc. Fourth International Conference Knowledge Discovery and Data Mining pp. 66-72, 1999
[3] Snehal A, "The Research of Intrusion Detection Based on Support vector machine", Proceedings of the 2008 International Conference on Wavelet Analysis and Pattern Recognition, Hong Kong, IEEE.2008
[4] Shun J and Malki H. A., "Network Intrusion Detection System using Neural Networks", IEEE computer society.2008.
[5] Muna Mhammad T. Jawhar and Monica Mehrotra, “A Study On Fuzzy Intrusion Detection”, In Proceedings of the Data Mining, Intrusion Detection, In formation Assurance, And Data Networks Security, SPIE, Vol. 5812, pp. 23-30, Orlando, Florida, USA, 2005
[6] Neal, and Hunt and Dasgupta, Cao, and Yang, “Anomaly Network Intrusion Detection Based on Improved AIS Technique”, Journal of Computers, Vol." “Adaptive Model Generation: An Architecture for the Deployment of Data Mining-Based Intrusion Detection Systems, Applications of Data Mining in Computer Security”, Kluwer Academic Publishers, Boston, MA, pp. 154-191, 2002
[7] Pohsiang Tsai,’A novel intrusion detection system based on hierarchical clustering and support vector machines", Expert Systems with Applications, Vol: 38, No: 1, pp: 306-313, 2011.
[8] Aida Hu Zhengbing, ”Approaches and machine learning Techniques for Intrusion Detection Systems”, Vol. 9, No. 12, pp. 181-186, 2009.
[9] Amit Kumar Choudhary,”An Effective Approach to Network Intrusion Detection System using Neural network technique”, International Journal of Computer Applications, Vol.1, No.3, pp.26–32, February 2010