A Review of Cyber Attack Classification Technique Based on Data Mining and Neural Network Approach
|
|
|
- Brittany Daniel
- 10 years ago
- Views:
Transcription
1 A Review of Cyber Attack Classification Technique Based on Data Mining Neural Network Approach Bhavna Dharamkar 1, Rajni Ranjan Singh 2 M.Tech Scholar 1, Department of Computer Science & Engg, VNS, Bhopal, INDIA Astt. Professor 2, Department of Computer Science & Engg, VNS, Bhopal, INDIA Abstract Cyber attack detection classification is major challenge for web network security. The increasing data traffic in network web invites multiple cyber attack. The dynamic nature large number of attribute of cyber data faced a problem of detection prevention. In current research trend various method framework are proposed by different authors. These framework proposed method is based on data mining neural network approach. Data mining offers various techniques such as clustering, classification, rule generation temporal event mining; these techniques are very efficient for detection process of cyber attack. The application of neural network in cyber attack classification use as feature reduction technique. Feature reduction is very important task in cyber attack classification; because the cyber attack data consists of huge amount of features. This paper presents various method of cyber attack detection classification technique based on data mining neural network approach along with IDS evaluation criteria dataset used for validated of IDS is also discussed here. Keywords: - cyber attack, data mining, neural network KDDCUP99 I. INTRODUCTION The efficiency data integrity of cyber data are major area of research in network security cyber security. The integrity of data compromised with current cyber attack. The current cyber attack creates illegal authorization traffic for denial of service. Cyber security is defined as the protection of cyber components against threats to discretion, reliability, Accessibility[1]. Privacy means that data is disclosed only according to rule, reliability means that data is not cracked or tainted that the network performs properly, availability means that network services are available when they are needed. Cyber attack detection system inspects all inside outside network movement identifies mistrustful patterns that may point to a network or system attack from someone attempting to break into or compromise a network[4]. In cyber attack detection, we generally deal with a large amount of data collected from cyber agent to make a decision on the current situation of the network. Different types of attacks may have different effects on the operations of a cyber network. As a result, the data that need to be collected from cyber agent vary from one kind of attacks to the other. For example, denial of service attacks aim at flooding the computing or memory resources of target systems preventing them from providing services to legitimate users. The most complex advanced attacks are beleaguered attacks which are specifically aimed at companies or governments to reach a predetermined aim.the Aurora trojan was aimed at obtaining intellectual property of large corporations. The Stuxnet worm was aimed at disruption of industrial systems in Iran[7]. The Diginotar hack was aimed at generating rogue signed certificates with the goal of spying on traffic to websites. Data mining algorithms that classify the attacks must do it accurately. It must reduce unclassified attack to improve accuracy. Classification errors can be reduced by various algorithms like ADA-boost, bagging wagging.[4] proposes multi-boosting technique, which is a combination of ADA-boost wagging techniques, to reduce classification errors. When compared with other techniques multi-boosting performs better in reducing classification errors in classification algorithms. Classification clustering techniques in data mining are useful for a wide variety of real time applications dealing with large amount of data. They detect attacks using the data mining techniques classification clustering algorithms. Classification techniques analyze categorize the data into known classes. Each data sample is labeled with a known class label. Clustering is a process of grouping objects resulting into set of clusters such that similar objects are members of the same cluster dissimilar objects belong to different clusters. Classification techniques are examples of supervised learning clustering techniques are examples of unsupervised learning. An artificial neural network consists of connected set of processing units. The connections have weights that determine how one unit will affect other. Subset of such units act as input nodes, output nodes remaining nodes constitute the hidden layer. By assigning activation to each of the input node allowing them to propagate through the hidden layer nodes to the output nodes, neural network performs a functional mapping from input values to output values. The mapping is stored in terms of weight over connection. This paper is divided into five sections. Section-I gives the introduction of cyber attack data mining. Section-II gives the related of cyber attack. Data mining ISSN: Page100
2 neural network in III. In section-iv evaluation performance analysis finally discuss conclusion future work in section V. II. RELATED WORK In this section described the related work of cyber attack classification with data mining neural network approach. The detection classification of cyber attack faced a problem of false detection of cyber attack data. The data mining neural network play an important role in cyber attack classification. The process improved the rate of classification. Some work in the field of attack classification discuss here. Clustering: The process of grouping a set of physical or abstract objects into classes of similar objects is called clustering. A cluster is a collection of data objects that are similar to one another within the same cluster are dissimilar to the objects in other clusters. A cluster of data objects can be treated collectively as one group so may be considered as a form of data compression. a) X.Li et al. [2] : authors proposed a work in level of hardware in from of Data storage devices may additionally be included in the network to support networked storage, local fault diagnosis, distributed decision making. There is a communication gateway in each community network. It manages the communication among the network elements, performs data aggregation, bridges the bottom top layers to allow data exchange. b) Vineet Richhariya, Dr J.L.Rana,Dr R.C.Jain, Dr. R.K.Pey [14] : authors Proposed a model in which first dimension reduction technique is applied. Secondly on reduced data set fuzzification of feature values is done to get simpler range. Thirdly combination of clustering naïve based approach, on the large test dataset applied. Obtained results are analyzed on detection rate, false positive rate precision rate. Fuzzy logic based discretization of the dataset has helped to improve the training data representation, performs well in terms of detecting attacks faster with reasonable reduction in false alarm rate. c) S. Staniford-Chen, S. Cheung, R. Crawford, M. Dilger, J. Frank, J. Hoagl, K. Levitt, C. Wee, R. Yip, D. Zerkle [15] : authors proposed a AFID is a framework for a distributed intrusion detection system that employs autonomous agents at the lowest level for data collection analysis transceivers monitors at the higher levels of the hierarchy for controlling the agents obtaining a global view of activities Classification: classification is an effective means for distinguishing groups or classes of objects; it requires the often costly collection labelling of a large set of training tuples or patterns which the classifier uses to model each group. It is often more desirable to proceed in the reverse direction Typical classify models have the linear regression model, the decision tree model, the model based on rule the neural network model d) Shailendra Singh, Sanjay Silakari [1] : authors proposed a model of Cyber Attack Detection System its generic framework, which has been found to perform well for all the classes of attack. In this framework authors used four tiers architecture to enhance the adaptability of the cyber attack detection system. The first tier is dedicated to data collection preprocessing of the data. The Second tier is meant for the feature extraction technique, third tier is dedicated to classification of cyber attacks fourth tier is dedicated to user interface for reporting the events. e) Hoa Dinh Nguyen, Qi Cheng [4] : authors proposed a new feature selection algorithm for distributed cyber attack detection classification. Different types of attacks together with the normal condition of the network are modeled as different classes of the network data. Binary classifiers are used at local sensors to distinguish each class from the rest. The proposed algorithm outputs for each local binary classifier a set of pair wise feature subsets which are selected for discriminating that particular class from each of the rest classes. This is different from conventional feature selection algorithms, which select a unique feature subset for each local binary classifier. The new feature selection method is shown to be more capable of selecting all relevant features, thus to improve the detection classification accuracy. f) Bimal Kumar Mishra, Hemraj Saini [5] : authors used classification approach of cyber attack which uses characteristics metrics game theoretic approach to classify the attacks to their closest category. The stard weights of the metrics are used as the base line to classify the cyber attacks in the proper category. The approach is simple extendible; as new characters of the newly identified attacks can be added to the attack characteristic metrics the corresponding unique weight to the character are assigned by the proposed formula. Besides this, the proposed approach clearly represents the cause effect relationship for all possible attacks which helps us to find the appropriate solution to restrict them in the Internet. g) Haitao Du, Christopher Murphy, Jordan Bean, Shanchieh Jay Yang [7] : In this paper authors used a statically theory of Mean that the track length the time interval between two observations can be very different, potentially by orders of magnitude. These differences, along with the various other uncharted features of cyber attack tracks present an exciting critical new challenge. This paper will first illustrate the non-uniformity cyber track features, as well as the pros cons of the traditional K- means clustering algorithm. h) Dewan Md.Farid,Nouria Harbi,Emna Bahri,Mohammad Zahidur Rahman,Chowdhury Mfizur Rahman [9] : In this paper authors proposed a new learning algorithm for anomaly based network intrusion detection system using decision tree algorithm that ISSN: Page101
3 distinguishes attacks from normal behaviors identifies different types of intrusions. i) Shailendra Singh, Sanjay Agarwal [12] : In this paper authors proposed an improved Support Vector Machine (isvm) algorithm for classification of cyber attack dataset. Result shows that isvm gives 100% detection accuracy for Normal Denial of Service (DOS) classes comparable to false alarm rate, training, testing times. The performance of traditional SVM is enhanced in this work by modifying Gaussian kernel to enlarge the spatial resolution around the margin by a conformal mapping, so that the separability between attack classes is increased. It is based on the Riemannian geometrical structure induced by the kernel function. III DATA MINING AND NEURAL NETWORK Data mining neural network play an important role in cyber attack classification. Data mining offer various technique for classification such as KNN, decision tree, SVM rule based classification; all these classification promise the result of classification. The result of classification suffered a problem of false detection. The false detection of data mining technique is big issues in research trend. Now the minimization of false detection rate in cyber attack classification required reduction of attribute in cyber data valid pattern of data. The artificial neural network plays an important role in feature reduction valid pattern generation. Over the complicated structure of neural network the neural networks approach can be applied to a wide range of pattern recognition problems intrusion detection included[18]. The idea behind the application of soft computing techniques particularly ANN in implementing cyber attack is to include an intelligent agent in the system that is capable of disclosing the latent patterns in abnormal normal connection audit records to generalize the patterns to new connection records of the same class[14]. And the beauty of neural networks in intrusion detection is that no signatures or even rules are needed. To simply start feeding input data concerning network or host based events to a neural network it does the rest. Neural networks are therefore well suited to picking up new patterns of attacks readily although some learning time is required [15]. The neural networks approach has been around for a long time if anything it is likely to become more widely used relied on in intrusion detection in the future as reliance on signatures diminishes. Different types of Artificial Neural Network exist for various purposes such as classification, prediction, clustering, association, etc. A feed-forward ANN was the first arguably simplest type of artificial neural network devised. In this network the information moves in only one direction forward from the input nodes through the hidden nodes (if any) to the output nodes[16]. There are no cycles or loops in the network) with the back propagation learning algorithm is commonly used for classification problems. Cyber attack detection can be considered a classification problem in that computer network data is classified into attack or normal use. One advantage of a feed-forward ANN for classification problems lies in its ability to learn a sophisticated nonlinear input-output function. The ANN learns signature patterns of cyber attacks normal use activities from the training data uses those signature patterns to classify activities in the testing data into attack or normal use[17]. Now a day s support vector machine is widely used a classification technique in cyber attack detection. The prediction of result of support vector machine is 90%. The process of grouping a set of physical or abstract objects into classes of similar objects is called clustering. A cluster is a collection of data objects that are similar to one another within the same cluster are dissimilar to the objects in other clusters. A cluster of data objects can be treated collectively as one group so may be considered as a form of data compression. Classification is an effective means for distinguishing groups or classes of objects; it requires the often costly collection labeling of a large set of training tuples or patterns which the classifier uses to model each group. It is often more desirable to proceed in the reverse direction Typical classify models have the linear regression model, the decision tree model, the model based on rule the neural network model. Table 1 gives the description of classification clustering technique for data mining with advantage disadvantage. Types Method Disadvanta ge Classificat ion methods Simple rules Neural Networ ks Support Vector Machin es Bayesia n Networ ks Decisio n Trees Complex situation are hard to define in simple rules Black box Slow on large sample sizes Cannot hle missing data well Very hard to find optimal Advantages Simple to use Can hle complex relations Small chance at over fitting possible to use dynamicall y Efficient with causal relations Can hle numeric text Concept If then like rules Mathemat ical model calculatin g output based on inputs Classes are separated by a hyperplan e by calculatin g support vectors to the closest points from each class Probabilit y of events Classifica tion by If..then.. ISSN: Page102
4 Clustering methods k- Nearest Neighb or Hidden Markov Models k- Means solution data types like tree structure Storage intensive susceptible to noise Events must be independe nt. (The events may not provide a probability of a following event.) Initial choice of parameter values Hard to find optimal solution sensitive to cluster shape Simple to implement Can analyze sequences of events in which the events are not independe nt Insensitive to noise cluster shape Preclassificati on not necessary Distance/ density calculatio n between case classes The probabilit y of a sequence of observed events is used to calculate the probabilit y of a sequence of nonvisible events. Clustering based on equality Clusters data into a given number of k clusters by minimizin g the mean distance to a cluster center algorithm for cyber attack classification; we can evaluate it practically using DARPA DATA SET AND KDD 99 cyber attack datasets [18]. In the DARPA IDS evaluation dataset, all the network traffic including the entire payload of each packet was recorded in tcpdump format provided for evaluation. In these evaluations, the data was in the form of sniffed network traffic, Solaris BSM audit data, Windows NT audit data (in the case of DARPA 1999) file system snapshots tried to identify the intrusions that had been carried out against a test network during the data-collection period. The test network consisted of a mix of real simulated machines; background traffic was artificially generated by the real simulated machines while the attacks were carried out against the real machines. Taking the DARPA 1999 dataset for further discussion, the dataset consists of weeks one, two three of training data weeks four five of test data. In training data, the weeks one three consist of normal traffic week two consists of labeled attacks. In 1998, DARPA in concert with Lincoln Laboratory at MIT launched the DARPA 1998 dataset for evaluating IDS [16]. The DARPA 1998 dataset contains seven weeks of training also two weeks of testing data. In total, there are 38 attacks in training data as well as in testing data. The refined version of DARPA dataset which contains only network data (i.e. Tcpdump data) is termed as KDD dataset [17]. The Third International Knowledge Discovery Data Mining Tools Competition were held in colligation with KDD-99, the Fifth International Conference on Knowledge Discovery Data Mining. KDD dataset is a dataset employed for this Third International Knowledge Discovery Data Mining Tools Competition. KDD training dataset consists of relatively 4,900,000 single connection vectors where each single connection vectors consists of 41 features is marked as either normal or an attack, with exactly one particular attack type [18]. These features had all forms of continuous symbolic with extensively varying ranges falling in four categories: Selforganizi ng maps Resulting model is a black box creating a model is computati onal intensive Good reduction of data feature dimension ality while maintainin g relationshi ps between the features Neural network where output neurons are pixels of a density map similar cases are mapped close to each other IV EVALUATION AND PERFORMANSE ANALYSIS In this section discuss DARPA 1999 KDD 99 dataset Evaluation of performance of data mining neural network 1. In a connection, the first category consists of the intrinsic features which comprises of the fundamental features of each individual TCP connections. Some of the features for each individual TCP connections are duration of the connection, the type of the protocol (TCP, UDP, etc.) network service (http, telnet, etc.). 2. The content features suggested by domain knowledge are used to assess the payload of the original TCP packets, such as the number of failed login attempts. 3. Within a connection, the same host features observe the recognized connections that have the same destination host as present connection in past two seconds the statistics related to the protocol behavior, service, etc are estimated. 4. The similar same service features scrutinize the connections that have the same service as the current connection in past two seconds. A variety of attacks incorporated in the dataset fall into following four major categories: ISSN: Page103
5 a. Denial of Service Attacks: A denial of service attack is an attack where the attacker constructs some computing or memory resource fully occupied or unavailable to manage legitimate requirements, or reject legitimate users right to use a machine. b. User to Root Attacks: User to Root exploits are a category of exploits where the attacker initiate by accessing a normal user account on the system (possibly achieved by tracking down the passwords, a dictionary attack, or social engineering) take advantage of some susceptibility to achieve root access to the system. c. Remote to User Attacks: A Remote to User attack takes place when an attacker who has the capability to send packets to a machine over a network but does not have an account on that machine, makes use of some vulnerability to achieve local access as a user of that machine. d. Probes: Probing is a category of attacks where an attacker examines a network to collect information or discover well-known vulnerabilities. These network investigations are reasonably valuable for an attacker who is staging an attack in future. An attacker who has a record, of which machines services are accessible on a given network, can make use of this information to look for fragile points. DATASET: MIT-DARPA dataset (IDEVAL 1999)1 was used to train test the performance of Intrusion Detection Sys-tems. The network traffic including the entire payload of each packet was recorded in tcpdump format provided for evaluation. The data for the weeks one three were used for thetraining of the anomaly detectors PHAD ALAD the weeks four ve were used as the test data. The DARPA 1999 test data consisted of 190 instances of 57 attacks which included 37 Probes, 63 DoS attacks, 53 R2L attacks, 37U2R/Data attacks with details on attack types given in Table 1. Attacks present in DARPA 1999 dataset Attack Attack type Classes Probe DoS R2L U2R portsweep, ipsweep, queso, satan, msscan, ntinfoscan, lsdomain, illegal-sni er apache2, smurf, neptune, dosnuke, l, pod, back, teardrop, tcpreset, syslogd, crashiis, arppoison, mailbomb, selfping, processtable, udpstorm, warezclient dict, netcat, sendmail, imap, ncftp, xlock, xsnoop, sshtrojan, framespoof, ppmacro, guest, netbus, snmpget, ftpwrite, httptunnel, phf, named sechole, xterm, eject, ps, nukepw, secret, perl, yaga, fdformat, ffbconfig, casesen, ntfsdos, ppmacro, loadmodule, sqlattack Table2. Different types of attacks in DARPA 1999 dataset In KDD99 dataset these four attack classes (DoS, U2R, R2L, probe) are divided into 22 different attack classes that tabulated in Table I. The 1999 KDD datasets are divided into two parts: the training dataset the testing dataset. The testing dataset contains not only known attacks from the training data but also unknown attacks. Since 1999, KDD 99 has been the most wildly used data set for the evaluation of anomaly detection methods.darpa 98 is about 4 gigabytes of compressed raw (binary) tcp-dump data of 7 weeks of network traffic, which can be processed into about 5 million connection records, each with about 100 bytes. For each TCP/IP connection, 41 various quantitative (continuous data type) qualitative (discrete data type) features were extracted among the 41 features, 34 features (numeric) 7 features. 4 Main Attack Classes 22 Attack Classes Denial of Service (DoS) Remote to User (R2L) back, l, neptune, pod, smurt, teardrop ftp_write, guess_passwd, imap, multihop, phf,spy, warezclient, warezmaster User to Root (U2R) buffer_overflow, perl, loadmodule, rootkit Probing(Information Gathering) ipsweep, nmap, portsweep, satan Table1. Different types of attacks in kdd99 dataset To analysis the different results using some stard parameter such as Precision- Precision measures the proportion of predicted positives/negatives which are actually positive/negative. Recall -It is the proportion of actual positives/negatives which are predicted positive/negative. Accuracy-It is the proportion of the total number of prediction that were correct or it is the percentage of correctly classified instances.true positive (TP) is the attacks that are detected which are actually true attacks,true False (TF) is the normal data is a ctually the normal data False-negative rate (FN) is the percentage that attacks are misclassified from total number of attack records. False-positive (FP) is the percentage that normal data records are classified as attacks from total number of normal data records. Below we are showing how to calculate these parameters by the suitable formulas. Precision = Recall = Accuracy = ISSN: Page104
6 FPR=, FNR= Tree World Academy of Science, Engineering Technology, Pp V CONCLUSION AND FUTURE WORK In this paper present current method of data mining neural network of cyber attack classification, in meticulous, this paper reviews recent papers which are between In addition, we consider a large number of data mining techniques used in the cyber attack domain for the review including clustering, classification, ensemble technique. Regarding the comparative results of related work, found that the improvement in process of cyber attack classification still needs to be researched. The applied process of neural network approach such as RBF are more effective than other method but still suffered from problem of false classification. REFERENCES: [1] Shailendra Singh, Sanjay Silakari An Ensemble Approach for Cyber Attack Detection System: A Generic Framework 14th ACIS, IEEE Pp [2] X. Li et al., Smart Community: An Internet of Things Application, IEEE Commun. Mag., vol. 49, no. 11, 2011, pp [3] V. Bapuji, R. Naveen Kumar2,Dr. A. Govardhan, S.S.V.N. Sarma Soft Computing Artificial Intelligence Techniques for Intrusion Detection System Vol 2, No.4, 2012, pp [4] Hoa Dinh Nguyen, Qi Cheng An Efficient Feature Selection Method For Distributed Cyber Attack Detection Classification IEEE pp 1-6. [5] Bimal Kumar Mishra,Hemraj Saini Cyber Attack Classification using Game Theoretic Weighted Metrics Approach World Applied Sciences Journal 7, Pp [6] Xu Li, Inria Lille, Xiaohui Liang, Xiaodong Lin, Haojin Zhu Securing Smart Grid: Cyber Attacks,Countermeasures, Challenges IEEE Communications Magazine IEEE Pp [10] Chee-Wooi Ten, Govindarasu Manimaran Cybersecurity for Critical Infrastructures:Attack Defense Modeling IEEE TRANSACTIONS ON SYSTEMS, vol-40 IEEE Pp [11] Mohammad A. Faysel, Syed S. Haque Towards Cyber Defense: Research in Intrusion Detection Intrusion Prevention Systems IJCSNS, vol Pp [12] Shailendra Singh, Sanjay Agrawal, Murtaza,A. Rizvi Ramjeevan Singh Thakur Improved Support Vector Machine for Cyber Attack Detection WCECS IEEE Pp 1-6. [13] Real-time Misuse Detection Systems, Proceedings of the IEEE on Information, [14 Vineet Richhariya, Dr. J.L.Rana,Dr. R.C.Jain,Dr. R.K.Pey Design of Trust Model For Efficient Cyber Attack Detection on Fuzzified Large Data using Data Mining techniques IJRCCT Vol 2, Issue 3, Pp [15] S. Staniford-Chen, S. Cheung, R. Crawford, M. Dilger, J. Frank, J. Hoagl, K. Levitt, C. Wee, R. Yip, D. Zerkle. GrIDS-a graph based intrusion detection system for large networks. In Proceedings of the 19th National Information Systems Security Conference, September [16] Howard, J.D. An Analysis of Security Incidents on the Internet Doctoral Thesis. UMI UMI Order No. GAX , Carnegie Mellon University [17] James P. Anderson, Computer security threat monitoring surveillance, IEEE pp [18] Deepak Rathore Anurag Jain Design Hybrid method for intrusion detection using Ensemble cluster classification SOM network in International Journal of Advanced Computer Research Volume-2 Number-3 Issue-5 September [7] Haitao Du, Christopher Murphy, Jordan Bean, Shanchieh Jay Yang Toward Unsupervised Classification of Nonuniform Cyber Attack Tracks International Conference on Information Fusion Pp [8] Abhishek Jain And Ashwani Kumar Singh Distributed Denial Of Service (Ddos) Attacks - Classification And Implications journal of Information Operations Management vol Pp [9] Dewan Md. Farid, Nouria Harbi, Emna Bahri, Mohammad Zahidur Rahman, Chowdhury Mofizur Rahman Attacks Classification in Adaptive Intrusion Detection using Decision ISSN: Page105
Usefulness of DARPA Dataset for Intrusion Detection System Evaluation
Usefulness of DARPA Dataset for Intrusion Detection System Evaluation Ciza Thomas Vishwas Sharma N. Balakrishnan Indian Institute of Science, Bangalore, India ABSTRACT The MIT Lincoln Laboratory IDS evaluation
Intrusion Detection using Artificial Neural Networks with Best Set of Features
728 The International Arab Journal of Information Technology, Vol. 12, No. 6A, 2015 Intrusion Detection using Artificial Neural Networks with Best Set of Features Kaliappan Jayakumar 1, Thiagarajan Revathi
Network Traffic Anomaly Detection Based on Packet Bytes
Network Traffic Anomaly Detection Based on Packet Bytes Matthew V. Mahoney Florida Institute of Technology, Melbourne, Florida [email protected] ABSTRACT Hostile network traffic is often "different"
A Review of Intrusion Detection Technique by Soft Computing and Data Mining Approach
A Review of Intrusion Detection Technique by Soft Computing and Data Mining Approach Aditya Shrivastava 1, Mukesh Baghel 2, Hitesh Gupta 3 Abstract The growth of internet technology spread a large amount
ANALYSIS OF PAYLOAD BASED APPLICATION LEVEL NETWORK ANOMALY DETECTION
ANALYSIS OF PAYLOAD BASED APPLICATION LEVEL NETWORK ANOMALY DETECTION Like Zhang, Gregory B. White Department of Computer Science, University of Texas at San Antonio [email protected], [email protected]
Neural networks vs. decision trees for intrusion detection
Neural networks vs. decision trees for intrusion detection Yacine Bouzida Mitsubishi Electric ITE-TCL 1, allée de Beaulieu CS 186 3578, Rennes, France [email protected] Frédéric Cuppens Département
Performance Evaluation of Intrusion Detection Systems using ANN
Performance Evaluation of Intrusion Detection Systems using ANN Khaled Ahmed Abood Omer 1, Fadwa Abdulbari Awn 2 1 Computer Science and Engineering Department, Faculty of Engineering, University of Aden,
A Survey on Intrusion Detection System with Data Mining Techniques
A Survey on Intrusion Detection System with Data Mining Techniques Ms. Ruth D 1, Mrs. Lovelin Ponn Felciah M 2 1 M.Phil Scholar, Department of Computer Science, Bishop Heber College (Autonomous), Trichirappalli,
Using Rough Set and Support Vector Machine for Network Intrusion Detection System Rung-Ching Chen and Kai-Fan Cheng
2009 First Asian Conference on Intelligent Information and Database Systems Using Rough Set and Support Vector Machine for Network Intrusion Detection System Rung-Ching Chen and Kai-Fan Cheng Ying-Hao
Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup
Network Anomaly Detection A Machine Learning Perspective Dhruba Kumar Bhattacharyya Jugal Kumar KaKta»C) CRC Press J Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor
STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS
STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS SACHIN MALVIYA Student, Department of Information Technology, Medicaps Institute of Science & Technology, INDORE (M.P.)
A new Approach for Intrusion Detection in Computer Networks Using Data Mining Technique
A new Approach for Intrusion Detection in Computer Networks Using Data Mining Technique Aida Parbaleh 1, Dr. Heirsh Soltanpanah 2* 1 Department of Computer Engineering, Islamic Azad University, Sanandaj
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015
RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer
VHDL Modeling of Intrusion Detection & Prevention System (IDPS) A Neural Network Approach
VHDL Modeling of Intrusion Detection & Prevention System (IDPS) A Neural Network Approach Tanusree Chatterjee Department of Computer Science Regent Education and Research Foundation Abstract- The rapid
Hybrid Intrusion Detection System Model using Clustering, Classification and Decision Table
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 4 (Mar. - Apr. 2013), PP 103-107 Hybrid Intrusion Detection System Model using Clustering, Classification
How To Prevent Network Attacks
Ali A. Ghorbani Wei Lu Mahbod Tavallaee Network Intrusion Detection and Prevention Concepts and Techniques )Spri inger Contents 1 Network Attacks 1 1.1 Attack Taxonomies 2 1.2 Probes 4 1.2.1 IPSweep and
Intrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. [email protected] J. Jiang Department
USING ROUGH SET AND SUPPORT VECTOR MACHINE FOR NETWORK INTRUSION DETECTION
USING ROUGH SET AND SUPPORT VECTOR MACHINE FOR NETWORK INTRUSION DETECTION Rung-Ching Chen 1, Kai-Fan Cheng 2 and Chia-Fen Hsieh 3 1 Department of Information Management Chaoyang University of Technology
Euclidean-based Feature Selection for Network Intrusion Detection
2009 International Conference on Machine Learning and Computing IPCSIT vol3 (2011) (2011) IACSIT Press, Singapore Euclidean-based Feature Selection for Network Intrusion Detection Anirut Suebsing, Nualsawat
An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection TR CS-2003-02
An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection TR CS-2003-02 Matthew V. Mahoney and Philip K. Chan Computer Science Department, Florida Institute of Technology
A survey on Data Mining based Intrusion Detection Systems
International Journal of Computer Networks and Communications Security VOL. 2, NO. 12, DECEMBER 2014, 485 490 Available online at: www.ijcncs.org ISSN 2308-9830 A survey on Data Mining based Intrusion
Efficient Security Alert Management System
Efficient Security Alert Management System Minoo Deljavan Anvary IT Department School of e-learning Shiraz University Shiraz, Fars, Iran Majid Ghonji Feshki Department of Computer Science Qzvin Branch,
An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation
An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation Shanofer. S Master of Engineering, Department of Computer Science and Engineering, Veerammal Engineering College,
EFFICIENT DATA PRE-PROCESSING FOR DATA MINING
EFFICIENT DATA PRE-PROCESSING FOR DATA MINING USING NEURAL NETWORKS JothiKumar.R 1, Sivabalan.R.V 2 1 Research scholar, Noorul Islam University, Nagercoil, India Assistant Professor, Adhiparasakthi College
KEITH LEHNERT AND ERIC FRIEDRICH
MACHINE LEARNING CLASSIFICATION OF MALICIOUS NETWORK TRAFFIC KEITH LEHNERT AND ERIC FRIEDRICH 1. Introduction 1.1. Intrusion Detection Systems. In our society, information systems are everywhere. They
DATA MINING TECHNIQUES AND APPLICATIONS
DATA MINING TECHNIQUES AND APPLICATIONS Mrs. Bharati M. Ramageri, Lecturer Modern Institute of Information Technology and Research, Department of Computer Application, Yamunanagar, Nigdi Pune, Maharashtra,
NETWORK INTRUSION DETECTION SYSTEM USING HYBRID CLASSIFICATION MODEL
NETWORK INTRUSION DETECTION SYSTEM USING HYBRID CLASSIFICATION MODEL Prof. Santosh T. Waghmode 1, Prof. Vinod S. Wadne 2 Department of Computer Engineering, 1, 2 JSPM s Imperial College of Engineering
An Overview of Knowledge Discovery Database and Data mining Techniques
An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,
Developing a hybrid method of Hidden Markov Models and C5.0 as a Intrusion Detection System
, pp.165-174 http://dx.doi.org/10.14257/ijdta.2013.6.5.15 Developing a hybrid method of Hidden Markov Models and C5.0 as a Intrusion Detection System Mahsa Khosronejad, Elham Sharififar, Hasan Ahmadi Torshizi
A Frequency-Based Approach to Intrusion Detection
A Frequency-Based Approach to Intrusion Detection Mian Zhou and Sheau-Dong Lang School of Electrical Engineering & Computer Science and National Center for Forensic Science, University of Central Florida,
Data Mining For Intrusion Detection Systems. Monique Wooten. Professor Robila
Data Mining For Intrusion Detection Systems Monique Wooten Professor Robila December 15, 2008 Wooten 2 ABSTRACT The paper discusses the use of data mining techniques applied to intrusion detection systems.
Social Media Mining. Data Mining Essentials
Introduction Data production rate has been increased dramatically (Big Data) and we are able store much more data than before E.g., purchase data, social media data, mobile phone data Businesses and customers
A Content based Spam Filtering Using Optical Back Propagation Technique
A Content based Spam Filtering Using Optical Back Propagation Technique Sarab M. Hameed 1, Noor Alhuda J. Mohammed 2 Department of Computer Science, College of Science, University of Baghdad - Iraq ABSTRACT
An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus
An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus Tadashi Ogino* Okinawa National College of Technology, Okinawa, Japan. * Corresponding author. Email: [email protected]
A Neural Network Based System for Intrusion Detection and Classification of Attacks
A Neural Network Based System for Intrusion Detection and Classification of Attacks Mehdi MORADI and Mohammad ZULKERNINE Abstract-- With the rapid expansion of computer networks during the past decade,
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM MS. DIMPI K PATEL Department of Computer Science and Engineering, Hasmukh Goswami college of Engineering, Ahmedabad, Gujarat ABSTRACT The Internet
IDS / IPS. James E. Thiel S.W.A.T.
IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods
Conclusions and Future Directions
Chapter 9 This chapter summarizes the thesis with discussion of (a) the findings and the contributions to the state-of-the-art in the disciplines covered by this work, and (b) future work, those directions
How To Use Neural Networks In Data Mining
International Journal of Electronics and Computer Science Engineering 1449 Available Online at www.ijecse.org ISSN- 2277-1956 Neural Networks in Data Mining Priyanka Gaur Department of Information and
An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework
An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework Jakrarin Therdphapiyanak Dept. of Computer Engineering Chulalongkorn University
An Introduction to Data Mining. Big Data World. Related Fields and Disciplines. What is Data Mining? 2/12/2015
An Introduction to Data Mining for Wind Power Management Spring 2015 Big Data World Every minute: Google receives over 4 million search queries Facebook users share almost 2.5 million pieces of content
Keywords - Intrusion Detection System, Intrusion Prevention System, Artificial Neural Network, Multi Layer Perceptron, SYN_FLOOD, PING_FLOOD, JPCap
Intelligent Monitoring System A network based IDS SONALI M. TIDKE, Dept. of Computer Science and Engineering, Shreeyash College of Engineering and Technology, Aurangabad (MS), India Abstract Network security
CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA
CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA Professor Yang Xiang Network Security and Computing Laboratory (NSCLab) School of Information Technology Deakin University, Melbourne, Australia http://anss.org.au/nsclab
Analysis of KDD CUP 99 Dataset using Clustering based Data Mining
, pp.23-34 http://dx.doi.org/10.14257/ijdta.2013.6.5.03 Analysis of KDD CUP 99 Dataset using Clustering based Data Mining Mohammad Khubeb Siddiqui and Shams Naahid College of Computer Engineering and Sciences,
NEURAL NETWORKS IN DATA MINING
NEURAL NETWORKS IN DATA MINING 1 DR. YASHPAL SINGH, 2 ALOK SINGH CHAUHAN 1 Reader, Bundelkhand Institute of Engineering & Technology, Jhansi, India 2 Lecturer, United Institute of Management, Allahabad,
PHAD: Packet Header Anomaly Detection for Identifying Hostile Network Traffic
PHAD: Packet Header Anomaly Detection for Identifying Hostile Network Traffic Matthew V. Mahoney and Philip K. Chan Department of Computer Sciences Florida Institute of Technology Melbourne, FL 32901 {mmahoney,pkc}@cs.fit.edu
Classification algorithm in Data mining: An Overview
Classification algorithm in Data mining: An Overview S.Neelamegam #1, Dr.E.Ramaraj *2 #1 M.phil Scholar, Department of Computer Science and Engineering, Alagappa University, Karaikudi. *2 Professor, Department
Knowledge Based System for Detection and Prevention of DDoS Attacks using Fuzzy logic
Knowledge Based System for Detection and Prevention of DDoS Attacks using Fuzzy logic Amit Khajuria 1, Roshan Srivastava 2 1 M. Tech Scholar, Computer Science Engineering, Lovely Professional University,
A Review on Network Intrusion Detection System Using Open Source Snort
, pp.61-70 http://dx.doi.org/10.14257/ijdta.2016.9.4.05 A Review on Network Intrusion Detection System Using Open Source Snort Sakshi Sharma and Manish Dixit Department of CSE& IT MITS Gwalior, India [email protected],
How To Detect Denial Of Service Attack On A Network With A Network Traffic Characterization Scheme
Efficient Detection for DOS Attacks by Multivariate Correlation Analysis and Trace Back Method for Prevention Thivya. T 1, Karthika.M 2 Student, Department of computer science and engineering, Dhanalakshmi
Mining Frequency Content of Network Traffic for Intrusion Detection
Mining Frequency Content of Network Traffic for Intrusion Detection Mian Zhou and Sheau-Dong Lang School of Computer Science, and National Center for Forensic Science University of Central Florida, Orlando,
How to Detect and Prevent Cyber Attacks
Distributed Intrusion Detection and Attack Containment for Organizational Cyber Security Stephen G. Batsell 1, Nageswara S. Rao 2, Mallikarjun Shankar 1 1 Computational Sciences and Engineering Division
A Dynamic Flooding Attack Detection System Based on Different Classification Techniques and Using SNMP MIB Data
International Journal of Computer Networks and Communications Security VOL. 2, NO. 9, SEPTEMBER 2014, 279 284 Available online at: www.ijcncs.org ISSN 2308-9830 C N C S A Dynamic Flooding Attack Detection
CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION
CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION MATIJA STEVANOVIC PhD Student JENS MYRUP PEDERSEN Associate Professor Department of Electronic Systems Aalborg University,
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 11 (November 2014)
Denial-of-Service Attack Detection Mangesh D. Salunke * Prof. Ruhi Kabra G.H.Raisoni CEM, SPPU, Ahmednagar HOD, G.H.Raisoni CEM, SPPU,Ahmednagar Abstract: A DoS (Denial of Service) attack as name indicates
Artificial Neural Network, Decision Tree and Statistical Techniques Applied for Designing and Developing E-mail Classifier
International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-1, Issue-6, January 2013 Artificial Neural Network, Decision Tree and Statistical Techniques Applied for Designing
Comparison of K-means and Backpropagation Data Mining Algorithms
Comparison of K-means and Backpropagation Data Mining Algorithms Nitu Mathuriya, Dr. Ashish Bansal Abstract Data mining has got more and more mature as a field of basic research in computer science and
Feature Selection using Integer and Binary coded Genetic Algorithm to improve the performance of SVM Classifier
Feature Selection using Integer and Binary coded Genetic Algorithm to improve the performance of SVM Classifier D.Nithya a, *, V.Suganya b,1, R.Saranya Irudaya Mary c,1 Abstract - This paper presents,
A SYSTEM FOR DENIAL OF SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS
Journal homepage: www.mjret.in ISSN:2348-6953 A SYSTEM FOR DENIAL OF SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS P.V.Sawant 1, M.P.Sable 2, P.V.Kore 3, S.R.Bhosale 4 Department
Intrusion Detection System: A Review
, pp. 69-76 http://dx.doi.org/10.14257/ijsia.2015.9.5.07 Intrusion Detection System: A Review Sanjay Sharma and R. K. Gupta Department of CSE & IT Madhav Institute of Technology and Science, Gwalior (M.P.),
A Secured Approach to Credit Card Fraud Detection Using Hidden Markov Model
A Secured Approach to Credit Card Fraud Detection Using Hidden Markov Model Twinkle Patel, Ms. Ompriya Kale Abstract: - As the usage of credit card has increased the credit card fraud has also increased
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
Network Intrusion Detection Using an Improved Competitive Learning Neural Network
Network Intrusion Detection Using an Improved Competitive Learning Neural Network John Zhong Lei and Ali Ghorbani Faculty of Computer Science University of New Brunswick Fredericton, NB, E3B 5A3, Canada
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
Adaptive Neuro-Fuzzy Intrusion Detection Systems
Adaptive Neuro-Fuzzy Intrusion Detection Systems Sampada Chavan, Khusbu Shah, Neha Dave and Sanghamitra Mukherjee Institute of Technology for Women, SNDT University, India Ajith Abraham Department of Computer
Radware s Behavioral Server Cracking Protection
Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
A Survey of Intrusion Detection System Using Different Data Mining Techniques
A Survey of Intrusion Detection System Using Different Data Mining Techniques Trupti Phutane, Apashabi Pathan Dept. of Computer Engineering, G.H.Raisoni College of Engineering & Management, Wagholi, India
Data Mining for Network Intrusion Detection
Data Mining for Network Intrusion Detection S Terry Brugger UC Davis Department of Computer Science Data Mining for Network Intrusion Detection p.1/55 Overview This is important for defense in depth Much
Development of a Network Intrusion Detection System
Development of a Network Intrusion Detection System (I): Agent-based Design (FLC1) (ii): Detection Algorithm (FLC2) Supervisor: Dr. Korris Chung Please visit my personal homepage www.comp.polyu.edu.hk/~cskchung/fyp04-05/
A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds
International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial
Network Intrusion Simulation Using OPNET
Network Intrusion Simulation Using OPNET Shabana Razak, Mian Zhou, Sheau-Dong Lang* School of Electrical Engineering & Computer Science and National Center for Forensic Science* University of Central Florida,
Manjeet Kaur Bhullar, Kiranbir Kaur Department of CSE, GNDU, Amritsar, Punjab, India
Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Multiple Pheromone
Index Terms: Intrusion Detection System (IDS), Training, Neural Network, anomaly detection, misuse detection.
Survey: Learning Techniques for Intrusion Detection System (IDS) Roshani Gaidhane, Student*, Prof. C. Vaidya, Dr. M. Raghuwanshi RGCER, Computer Science and Engineering Department, RTMNU University Nagpur,
Role of Anomaly IDS in Network
Role of Anomaly IDS in Network SumathyMurugan 1, Dr.M.Sundara Rajan 2 1 Asst. Prof, Department of Computer Science, Thiruthangal Nadar College, Chennai -51. 2 Asst. Prof, Department of Computer Science,
Network Based Intrusion Detection System using Genetic Algorithm: A Study
Network Based Intrusion Detection System using Genetic Algorithm: A Study 1 Purushottam Patil, 2 Dr. Yogesh Sharma and 3 Dr. Manali Kshirsagar 1 Research Scholar (Computer Science & Engineering), Faculty
Improving Intrusion Detection Performance Using Keyword Selection and Neural Networks. Abstract
Improving Intrusion Detection Performance Using Keyword Selection and Neural Networks Richard P. Lippmann MIT Lincoln Laboratory, Rm S4-121 244 Wood Street Lexington, MA 02173-0073 [email protected] phone:
Denial-Of-Service Attack Detection Based On Multivariate Correlation Analysis and Triangle Area Map Generation
Denial-Of-Service Attack Detection Based On Multivariate Correlation Analysis and Triangle Area Map Generation Heena Salim Shaikh, Parag Ramesh Kadam, N Pratik Pramod Shinde, Prathamesh Ravindra Patil,
Network Machine Learning Research Group. Intended status: Informational October 19, 2015 Expires: April 21, 2016
Network Machine Learning Research Group S. Jiang Internet-Draft Huawei Technologies Co., Ltd Intended status: Informational October 19, 2015 Expires: April 21, 2016 Abstract Network Machine Learning draft-jiang-nmlrg-network-machine-learning-00
HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK
HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK 1 K.RANJITH SINGH 1 Dept. of Computer Science, Periyar University, TamilNadu, India 2 T.HEMA 2 Dept. of Computer Science, Periyar University,
IDENTIFIC ATION OF SOFTWARE EROSION USING LOGISTIC REGRESSION
http:// IDENTIFIC ATION OF SOFTWARE EROSION USING LOGISTIC REGRESSION Harinder Kaur 1, Raveen Bajwa 2 1 PG Student., CSE., Baba Banda Singh Bahadur Engg. College, Fatehgarh Sahib, (India) 2 Asstt. Prof.,
Mobile Phone APP Software Browsing Behavior using Clustering Analysis
Proceedings of the 2014 International Conference on Industrial Engineering and Operations Management Bali, Indonesia, January 7 9, 2014 Mobile Phone APP Software Browsing Behavior using Clustering Analysis
Adaptive Layered Approach using Machine Learning Techniques with Gain Ratio for Intrusion Detection Systems
Adaptive Layered Approach using Machine Learning Techniques with Gain for Intrusion Detection Systems Heba Ezzat Ibrahim Arab Academy for Science, Technology and Maritime Transport Cairo, Egypt Sherif
Spam detection with data mining method:
Spam detection with data mining method: Ensemble learning with multiple SVM based classifiers to optimize generalization ability of email spam classification Keywords: ensemble learning, SVM classifier,
Knowledge Based Descriptive Neural Networks
Knowledge Based Descriptive Neural Networks J. T. Yao Department of Computer Science, University or Regina Regina, Saskachewan, CANADA S4S 0A2 Email: [email protected] Abstract This paper presents a
