Mining Association Rules to Evade Network Intrusion in Network Audit Data
|
|
|
- Adela Zoe Bruce
- 10 years ago
- Views:
Transcription
1 Mining Association Rules to Evade Network Intrusion in Network Audit Data Kamini Nalavade 1, B.B. Meshram 2 Abstract With the growth of hacking and exploiting tools and invention of new ways of intrusion, intrusion detection and prevention is becoming the major challenge in the world of network security. The increasing network traffic and data on Internet is making this task more demanding. There are various approaches being utilized in intrusion detections, but unfortunately any of the systems so far is not completely flawless. The false positive rates make it extremely hard to analyse and react to attacks. Intrusion detection systems using data mining approaches make it possible to search patterns and rules in large amount of audit data. In this paper, we represent a model to integrate association rules to intrusion detection to design and implement a network intrusion detection system. Our technique is used to generate attack rules that will detect the attacks in network audit data using anomaly detection. This shows that the modified association rules algorithm is capable of detecting network intrusions. The KDD dataset which is freely available online is used for our experimentation and results are compared. Our intrusion detection system using association rule mining is able to generate attack rules that will detect the attacks in network audit data using anomaly detection, while maintaining a low false positive rate. Keywords Intrusion, Security, Association rule mining, Network, Data mining 1. Introduction Communication on Internet, in spite of implementation of advanced security measures, is always under innovative and inventive attacks. Given the different type of attacks like Denial of Service, Manuscript received May 26, Kamini Nalavade, Computer Department, V.J.T.I., Matunga, Mumbai India. B.B. Meshram, Computer Department, V.J.T.I, Matuna, mumbai, India. Probing, Remote to Local, User to Root and others, it is a challenge for any intrusion prevention system to detect a wide variety of attacks. The goal of intrusion detection systems is to automatically detect attack from the continuous stream of network data traffic and generate alarm for administrator. Two methods are used for intrusion detection: Signature based detection and Anomaly based detection. Signature based systems are used to detect known attacks and require prior knowledge of attack signatures. These methods perform rule matching to detect intrusions. But these kinds of systems are not sufficient to detect new or unknown attacks. Anomaly detection systems assume that an intrusion is an deviation of the system behaviour from its normal pattern. In such cases use of data mining and machine learning approaches can be used for intrusion detection. Data mining algorithms can be used to discover patterns, relationships, factors, clusters, associations, profiles, and prediction that were previously hidden. Using normal reports, Data mining can produce decisions and create alerts when action is required. Association rule mining is generally used to find the interesting rules from a large database depending upon the user defined support and confidence. A frequent item set is defined as one that occurs more frequently in the given data set than the user given support value. One more threshold confidence is used to restrict the association rules to a limited number. Confidence also includes the item sets having low support but from which high confidence rules may be generated. Suppose I is the set of itemsets, an association rules is an implication of the form, A=>B, where A subset of I, B subset of I & A B=Ø. The rules A=>B holds in transaction set T with support s if s% of the transactions in T contain both A and B. Similarly the rule A=>B holds in T with confidence c if c% of the transactions in T support A also support B. [1] By analysing the audit logs, meaningful data can be extracted to generate better detection models. We can mine association rules from system audit data and use these generated rules to detect anomalies. Identifying association patterns in intrusion data set will help to design better Intrusion Detection and Prevention System (IDPS). The major objective of this paper is 560
2 to build an intrusion detection system using association rule mining. Association rule mining means generating interesting rules from audit data to detect unknown intrusions. The paper is organized as follows: Section 2 we provide the related work done in this research area. Section 3 explains the association rule mining and apriori algorithm for intrusion detection. In section 4 we describe our proposed system for network intrusion detection and prevention. Section 4 illustrates the experimentation and results carried out followed by conclusion. 2. Previous Work M.Sulaiman khan, Maybin Muyeba and Frans Coenen[2] described weighted association rule mining from fuzzy data in their paper. In their paper [5], they proposed association rule mining for weighted value not necessarily binary value. The value should be continuous or discrete value to be presented in the database. Murtagh, and Farid, in their paper on Weighted Association Rule Mining Using Weighted Support and Significance Framework addressed the issues of discovering significant binary relationships in transaction datasets in a weighted setting[3]. The focused on those significant relationships involving items with significant weights rather than being flooded in the combinatornal explosion of insignificant relationships. In 2001, Li, F proposed an approach for association rule mining for weighted association rules [4]. Wang and Fan [6] proposed non-iterative improved Apriori algorithm to discover IDS alerts. They used intersection of two distinct rows of (DARPA 99 dataset to detect reoccurring patterns. If same pattern is repeated in many intersection operations, then it is considered as interesting pattern and used as Intrusion alert. Zhang yanyan and Yao Yuan [7] presented partition-based association rule detection algorithm for IDS rule generation. During first pass they partitioned training database in such a way that each partition of database can be entirely copied into a main memory of processing device. Then Large Item sets for each partition are identified independently. The union of these large item sets is then used as candidate large item sets for complete dataset. During second pass, large item sets for complete database are identified. This algorithm cannot be efficiently converted into incremental association rule detection algorithm and time complexity of it is very high. 561 In 2009 Flora S. Tsai [8] described network intrusion detection system using association rule mining in his paper. This method helped to generated interesting rules from the KDD data set. The intrusion detection dataset KDD99 contains variety of data starting from binary, discrete and continuous data. So, it is very difficult to generate rules for a particular attack using same approach. To find the association rules Ming- Yang Su et al [9] proposed incremental fuzzy association rules mining algorithm for Network Intrusion Detection System. They used link list of link list to store all possible candidate item sets and their support count in main memory. This information is updated periodically using network traffic data collected. Updated information is then used by incremental algorithm to identify large and interesting item sets, which are used as rules for NIDS. The major drawback of this algorithm is huge main memory requirement to sore all candidate item sets of every size. 3. Association Rule Mining for Intrusion Detection Data mining generally refers to the process of extracting or mining knowledge from a large amount of data. This process is the core of Knowledge Discovery and Data mining (KDD). Association rule mining is the task of discovering correlations and patterns from the dataset. Association rules mining started as a technique for finding interesting rules from transactional databases [1]. Association rule problem : Given a set of items I={I1,I2,,Im} and a database of transactions D={t1,t2,, tn} where ti={ii1,ii2,, Iik}, the Association Rule Problem is to identify all association rules A =>B which satisfy minimum support and confidence where A is subset of I and B is subset of I[13]. The support of the rule is the percentage of transactions that contains both A and B in all transactions and is calculated as Support= Confidence= The support of the rule measures the significance of the correlation between itemsets. The confidence is the percentage of transactions that contain B in the transactions that contain A. The support is a measure
3 of the frequency of a rule and the confidence is a measure of the strength of the relation between the sets of items. Two Step Process of association rule mining: i) Frequent itemset identification Discover the large itemsets that have transaction support above a predefined minimum threshold. Given d items, there are 2 d possible candidate itemsets null A B C D E AB AC AD AE BC BD BE CD CE DE ABC ABD ABE ACD ACE ADE BCD BCE BDE CDE ABCD ABCE ABDE ACDE BCDE ABCDE Figure 1: Frequent itemset generation ii) Rule generation from frequent itemset Use the obtained large itemsets to generate the association rules that have confidence above a predefined minimum threshold. Different datasets available for intrusion detection are DARPA, KDDcup99 etc. These datasets features contain values which may be binary, continuous or discrete. To discover the association rules from the dataset, various approaches should be applied for different kind of dataset as follows. A. Association Rule Mining for Binary Value For binary weighted value it is easy to find out the frequent item set. In association rules mining weights are considered as the highest priority. In those rules Apriori algorithm is executed in two steps. First it generates candidate sets. Second, it prunes the entire non-frequent item set after each step using the minimum support and the weight of the item. Many non-frequent itemsets are eliminated by the pruning process. B. Association Rule Mining for Continuous Value If a particular attribute takes a value in the range [0 1] it is taken as a continuous attribute. This could be taken as Fuzzy data and hence fuzzy weighted association rule mining as described in[2][5] could be used here. The weight of fuzzy data can be defined as Fuzzy Item Weight (FIW). Now Fuzzy Item set Transaction Weight (FITW) is the aggregate weights of all the fuzzy sets associated with the items in the item set present in a single transaction. From this FITW support and Confidence value can be calculated as per generalizing the notion of support. C. Association Rule Mining for Discrete value If the range of values that an attribute in the data set is very large, then normalization of the data becomes very difficult. The traditional approach to deal with this type of data is to convert each value into a set of binary values. The discrete attributes are normalized i.e. we find a set of thresholds that can be used to convert the attributes into a categorical variable. This kind of normalization affects the accuracy of the rule generation technique which may lead to higher misclassification rate [1]. Apriori Algorithm There are different types of algorithms used to mine frequent item sets from the dataset. One of the most popular data mining approaches is to find frequent item sets from a transaction dataset and derive association rules is Apriori algorithm. Many of the patterns finding algorithms such as decision tree, classification rules and clustering techniques that are frequently used in data mining have been developed in machine learning research community. Frequent pattern and association rule mining is one of the few exceptions to this tradition. The introduction of this technique boosted data mining research and its impact is tremendous. The algorithm is quite simple and easy to implement. Since Apriori algorithm was first introduced and as experience was accumulated, there have been many attempts to devise more efficient algorithms of frequent itemset mining. Many of them share the same idea with Apriori in that they generate candidates. These include hash-based technique, partitioning, sampling and using vertical data format. Apriori is a seminal algorithm for finding frequent item-sets using candidate generation [12]. It is characterized as a level-wise complete search algorithm using anti-monotonicity of item-sets, if an 562
4 item-set is not frequent, any of its superset is never frequent. Apriori Property It is an anti-monotone property: if a set is not frequent, all of its supersets will not frequent as well. In other words all nonempty subsets of a frequent itemset must also be frequent. An itemset I is not frequent if it does not satisfy the minimum support threshold: P(I) < min_sup If an item A is added to the itemset I, then the resulting itemset cannot occur more frequently than I.[10] null 4. Proposed Intrusion Detection and Prevention System In this paper, we propose a network intrusion detection and prevention system model that analyses the various item set generated, specifically on attribute relation. In our system, we apply association rule mining to generate attack signatures from the network traffic data. We propose an Intrusion detection and prevention system as shown below: A B C D E AB AC AD AE BC BD BE CD CE DE Found to be Infrequent ABC ABD ABE ACD ACE ADE BCD BCE BDE CDE Pruned supersets ABCD ABCE ABDE ACDE BCDE ABCDE Figure 2: Apriori frequent itemset generation [10] Pseudo code[12] Ck: Candidate itemset of size k Lk : frequent itemset of size k L1 = {frequent items}; for (k = 1; Lk!=Æ; k++) do - Ck+1 = candidates generated from Lk; - for each transaction t in database do increment the count of all candidates in Ck+1 that are contained in t; endfor; - Lk+1 = candidates in Ck+1 with min_support endfor; return k Lk; 563 Figure 3: Proposed Intrusion Protection System As shown in figure 3, we propose a network intrusion protection system using data mining feature which will work at all layers of TCP/IP. The modules of our system are 1. Data Pre-processing 2. Intrusion Detection Module 3. Analysis Engine 4. Recommendation system When a packet is received Intrusion detection module performs signature matching with the Rule base. If intrusion is found Recommendation Engine is triggered. These attacks have some standard signatures which are verified with the contents of packets. As from our research we studied that the attacks are either carried out by crafting header part of protocols or inserting some malicious code in data part. Otherwise packet is stored for the future analysis. Data mining and analysis module is invoked by NIPS to perform intrusion analysis on the captured packets to decide the future security policy. Recommendation engine is capable of generating alarms along with the features of blocking IP
5 addresses, blocking ports, black list maintenance, discarding connection and reporting errors. Pre-processing is the organization of collected data from sensors in a particular pattern. This data is then placed in a structured database format by means of parsing and reconstructing. The cleansing process is protocol specific as we need different attributes of packets for intrusion analysis. If packet is from blacklisted source then system should discard packet without verifying it. The analysis begins with application of frequent itemset mining to the collection of traffic database. Our proposed system uses association rule mining algorithm to generate attack signatures. The Apriori algorithm will find out frequent itemsets from the pool of data with support and confidence values. This support and confidence values will help in decision making about the severity and sensitivity of intrusion. The generated rules are stored in the rule base for future packet inspection. Our approach for intrusion detection works as follows: First algorithm finds all frequent itemsets from the data. After finding the frequent item set, support and confidence values, rules have to be generated for each attack types. Frequent itemset generation is carried out by applying Apriori Algorithm to the dataset. For Rule generation we apply the following algorithm. Here LFset contains the largest frequent item set. Min_sup defines the user define support and Min_conf defines the user defines confidence. RULEGeneration contains the desired rules generated from data set. The algorithm is explained as follows: Rule Generation Algorithm Input: Large frequent itemset LFset Minimum support Min_Ssp Minimum confidence Min_Conf Output: Attack Signatures Step1 : Generate all possible subsets of LFset and store it in FSTORE. Step2: Count SUP and CONF value for each elements of FSTORE. Step3: If (SUP>=Min_Sup && CONF>=Min_Conf) then Step 3.1: Choose the particular elements of FSTORE and store in RULEGeneration Step 3.2: Continue to generate rules and save in RULE Generation for all frequent sets. Step4: Else reject the particular element of FSTORE 564 and go to next. Step5: Return RULEGeneration. Step6: End. 5. System Evaluation and Results In this section we demonstrate how the system parameters are decided and fixed. Also the different performance parameters used to evaluate the system. Then we discuss the results achieved in intrusion detection using k-means clustering algorithm on KDD cup dataset. Next we evaluated the performance of k-means clustering algorithm with different values of initial cluster. 5.1 Dataset and Normalization of data The dataset used is KDDcup1999 [11] intrusion dataset which contains wide variety of intrusions simulated in network environment to acquire nine weeks of raw TCP dump data for a local-area network. A connection is a sequence of TCP packets starting and ending at some well-defined times, between which data flows to and from a source IP address to a target IP address. Each connection is labeled as either normal, or as an attack, with exactly one specific attack type. It is important to note that the testing data is not from the same probability distribution as the training data. This makes the task more realistic. The attacks in each class are as shown below: Table 1: Classes of Attacks S.N Class Attack Types 1 DOS Back, Land, Neptune,pod, smurf, Teardrop, 2 U2R Buffer_overflow, loadmodule, perl, rootkit 3 R2L ftp_write, guess_passwd, imap, multihop, phf, spy,warezlient, warezmaster 4 Probe IPsweep,nmap, satan,portsweep The 22 different types of network attacks in the KDD99 dataset fall into four main categories: DOS (Denial of Service), Probe, R2L (Remote to Local), U2R (user to remote). There are 41 features for each connection record that are divided into discrete sets and continuous sets according to the feature values. It consists of number of total records In order to know how to read the data from the audit data, we need to analyze how the audit da ta is being recorded. The audit data is processed for data mining purpose and is split into two files, the training set which
6 contains around five million rows and the test set with 10% of the training set. Table 2: Distribution of records Original Records Distinct Records Reduction Rate Attacks % Normal % Total % The table above show the distribution of KDD dataset in the 10 % training data. 5.2 Performance Parameters There are many measures available for evaluating system performance. For evaluating intrusion detection results following measure are generally used. 1. True positive (TP) means number connections that were correctly classified as intrusion. 2. True Negative (TN) means number of connections that were incorrectly classified as intrusion. 3. False positive (FP) means number of intrusion connections that were incorrectly classified as normal. 4. False negative FN) means number of normal connections that were incorrectly classified as intrusion. To determine how many misclassification are found we use term Recall. Precision is how many records are correctly classified by the system. Precision=TP/TP+FP..(1) Recall=TP/TP+FN.(2) Accuracy= TP+ TN TP+ TN + FP+ FN...(3) association rule mining with different support and confidence value. The second set of results shows the attack signatures generated are different cluster values for k-means algorithm affects the performance of system. 5.3 Experimental results-i: frequent item set generation, support and confidence values The proposed method for misuse detection is carried out with KDD99 Cup database in order to compare results with other machine-learning methods. The training dataset contains 400 attack connections randomly selected from KDD99 Cup database, where four types of attacks (Dos, Probe, U2R and R2L) are included. Experiment is performed on laptop with Intel Core i5-3230m CPU@ 2.60 GHz and 4 GB Ram. Operating system installed was Windows7. Algorithm was implemented using Java language. KDD 99 dataset is used to perform experimental tests. KDD 10% training data is used for finding Association rules to detect DoS attacks. Then KDD test data with corrected labels is used to test the accuracy of generated Association rules. Rule Mining for Symbolic features: Initially 3 symbolic features were selected, protocol_type, service and flag. Minimum support is 50% and minimum confidence is 80%. Number of rounds performed is 10 and 9 rules were generated as shown below: Confusion Matrix for Intrusion Protection System Actual Class Table 3: Confusion Matrix Predicted Class Normal Attack Normal TP FN Attack FP TN In the next section, we present two sets of experiments, each designed to demonstrate a different point. The first set is used to demonstrate the frequent item set generation from the KDDcup99 dataset using Figure 4: Frequent Itemsets Generated with support and confidence values Rule mining for a total of 6 attributes: First 6 attributes that is duration, protocol type, service, flag, source bytes and destination bytes of KDD99 dataset is selected for frequent itemset generation respectively. 35 rules generated, with 11 frequent itemsets. In third check we selected all nominal attributes of the dataset. We could generate 837 rules from the 565
7 dataset with 154 frequent itemsets. Note we have kept support and confidence value constant for the experimentation. 5.4 Experimental results-ii: Rules generated This method generates frequent rules for intrusion detection system whose occurrences exceed a predefined minimum support threshold. The threshold in proposed model is equal 70% and confidence is 80%. The sample rules which we received from the system are shown below in table No Rules generated 1 (service = http, flag = S0) (service = http, flag = S0) (service = http, flag = S0) 2 service=ecr i, host count 5,host srv count 5. 3 host REJ % 83%, host diff srv % 87%. 4 hot>3 root_shell>0 5 src_bytes<=10 0 dst_host_same _src_port_rate 6 failed_logins>4 - >protocol=tcp, dst_port=23 Table 4: Rules Table Attack Types SYN flood attack smurf satan Buffer overflow Buffer overflow Guess password Description Means that 80% of all the http connections have duration less than one second. If the service is icmp echo request, e number of connections that have the same destination host as the current one is at least 5 The % of rejected connections are at least 83%, and the % of different services is min 87% If the no of hot indicators is 3, and a root shell is obtained, then connection is a buffer overflow attack. If src bytes is less than 100 and destination and host have same port no then buffe overflow If number of failed logins is more than 4 on a telnet connection then it is an guess password attack. The above table shows some of the rules generated from frequent itemsets. Only the sets satisfying minimum support and confidence are selected as per rue generation algorithm given above. Although our models were intended for misuse detection, we had hoped that the features we constructed would be general enough so that the models can detect new variations of the known intrusions. We need to use anomaly detection models on network traffic or system programs to guard against the new and diversified attacks. Anomaly detection is much more challenging than misuse detection. Our future work includes developing network anomaly detection strategies, and devising a mechanical procedure to translate our automatically learned detection rules into modules for real-time IPSs. The evaluation of Apriori algorithm with the five attacks of KDD dataset is shown below in the table. Table 5: Performance of Apriori with KDD S.N. Attack FP Rate Accuracy Type 1 Neptune Smurf Land Pod satan Conclusion and Future Work Intrusion Detection is also increasingly valued by everyone. With the rapid development of Internet, network security issues also wants to highlight, combining data mining algorithms, Intrusion Detection can prevent network intrusion, greatly improving security Currently Network-based intrusion detection detects intrusions based on signatures. The association rules mining is the base of the data mining models built. The quality of this algorithm lies in the level of efficiency and speed. The paper discusses the association rules and the Apriori algorithm which is applied to Intrusion Detection problems. Association rules algorithm is an important data mining algorithms. In this paper we present a framework to look for evasions over a given intrusion dataset. Evasion technique is used for detecting new attacks based on the information of known attacks. The aim of using our framework is not to break the detection of the NIPS. For this purpose we are using the KDD cup 1999 dataset and 566
8 applying the signature Apriori algorithm which is well known and widely used for intrusion detection. This framework used to detect the unknown attacks with high accuracy rate and high efficiency. This type of evade NIPS has very vast scope in future like one is to create our own dataset. The other is to analyse if these techniques can be applied straight to model a commercial NIPS. Acknowledgment I express deep sense of gratitude for my Institute Sandip Institute of Engineering & Management, Nasik for their support, appreciation and motivation. References [1] Asim Das, S.Siva Sathya, ASSOCIATION Rule Mining For Kdd Intrusion Detection Data Set, International Journal Of Computer Science And Informatics Issn (PRINT): , Volume- 2, Issue-3, [2] M. Sulaiman Khan, Maybin Muyeba, Frans Coenen, Weighted Association Rule Mining from Binary and Fuzzy Data, ICDM 2008, LNAI 5077, pp , [3] Tao, F., Murtagh, F., Farid, M, Weighted Association Rule Mining Using Weighted Support and Significance Framework. In: Proceedings of 9th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, pp , Washington DC, [4] Lu, S., Hu, H., Li, F, Mining Weighted Association Rules, Intelligent data Analysis Journal, 5(3), , [5] M. Sulaiman Khan, Maybin Muyeba, Frans Coenen, David Reid, Mining Fuzzy Association Rules from Composite Items, Lecture Notes in Computer Science Volume 5433, 2009, pp [6] Wang Taihua, Guo Fan, Associating IDS Alerts by an Improved Apriori Algorithm, Third International Symposium on Intelligent Information Technology a nd Security Informatics, /10, 2010 I EEE, pp [7] Zhang yanyan,yao Yuan, Study of Database Intrusion Detection Based on Improved Association Rule Agorithm, /10, 2010 IEEE, pp [8] Flora S. Tsai, Network Intrusion Detection Using Association Rules. In International Journal of Recent Trends in Engineering, vol 2, No 2, November [9] Ming-Yang Su, Kai-Chi Chang, Hua-Fu Wei, Chun-Yuen Lin, A Real-time Network Intrusion Detection System Based on Incremental Mining Approach, /08, 2008 IEEE, pp [10] [11]kdd.ics.uci.edu/database/kddcup99/kddcup99.htm. [12] R.Aggarwal, T. Imielinski, A. Swami, Mining association rules between sets of items in very large database, Proceedings of ACM SIGMOD conference, [13] Agarwal, R. Srikant, Fast Algorithms for Mining Association Rules. In: 20 th VLDB Conference, pp , Kamini C. Nalavade received the B.E. degree in computer science and engineering from the SGGS, College of engineering and technology, Nanded in 2001 and M.Tech degree in computer engineering from Veermata Jijabai Technological Institute (VJTI), Mumbai in She is currently PhD student in the department of computer Author s engineering, Photo VJTI, Mumbai. Her research interest includes intrusion detection, network security, data mining and data privacy. She has published more than 20 papers in International journals and Conferences. Dr. B. B. Meshram is currently professor and Head of Computer Technology Department of Veermata Jijabai Technological Institute (VJTI), Matunga, Mumbai (INDIA). His areas of interest include Object oriented database management systems, Computer network security and multimedia systems. He has Author s published Photo more than 200 papers in National & International Conferences & refereed Journals. He has submitted more than five patents in his research interest area. 567
Finding Frequent Itemsets using Apriori Algorihm to Detect Intrusions in Large Dataset
Finding Frequent Itemsets using Apriori Algorihm to Detect Intrusions in Large Dataset Kamini Nalavade1, B.B. Meshram2, Abstract With the growth of hacking and exploiting tools and invention of new ways
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Intrusion Detection using Artificial Neural Networks with Best Set of Features
728 The International Arab Journal of Information Technology, Vol. 12, No. 6A, 2015 Intrusion Detection using Artificial Neural Networks with Best Set of Features Kaliappan Jayakumar 1, Thiagarajan Revathi
MAXIMAL FREQUENT ITEMSET GENERATION USING SEGMENTATION APPROACH
MAXIMAL FREQUENT ITEMSET GENERATION USING SEGMENTATION APPROACH M.Rajalakshmi 1, Dr.T.Purusothaman 2, Dr.R.Nedunchezhian 3 1 Assistant Professor (SG), Coimbatore Institute of Technology, India, [email protected]
An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework
An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework Jakrarin Therdphapiyanak Dept. of Computer Engineering Chulalongkorn University
Data Mining: Partially from: Introduction to Data Mining by Tan, Steinbach, Kumar
Data Mining: Association Analysis Partially from: Introduction to Data Mining by Tan, Steinbach, Kumar Association Rule Mining Given a set of transactions, find rules that will predict the occurrence of
Performance Evaluation of Intrusion Detection Systems using ANN
Performance Evaluation of Intrusion Detection Systems using ANN Khaled Ahmed Abood Omer 1, Fadwa Abdulbari Awn 2 1 Computer Science and Engineering Department, Faculty of Engineering, University of Aden,
Application of Data Mining Techniques in Intrusion Detection
Application of Data Mining Techniques in Intrusion Detection LI Min An Yang Institute of Technology [email protected] Abstract: The article introduced the importance of intrusion detection, as well as
Data Mining Apriori Algorithm
10 Data Mining Apriori Algorithm Apriori principle Frequent itemsets generation Association rules generation Section 6 of course book TNM033: Introduction to Data Mining 1 Association Rule Mining (ARM)
Efficient Security Alert Management System
Efficient Security Alert Management System Minoo Deljavan Anvary IT Department School of e-learning Shiraz University Shiraz, Fars, Iran Majid Ghonji Feshki Department of Computer Science Qzvin Branch,
Web Forensic Evidence of SQL Injection Analysis
International Journal of Science and Engineering Vol.5 No.1(2015):157-162 157 Web Forensic Evidence of SQL Injection Analysis 針 對 SQL Injection 攻 擊 鑑 識 之 分 析 Chinyang Henry Tseng 1 National Taipei University
STANDARDISATION AND CLASSIFICATION OF ALERTS GENERATED BY INTRUSION DETECTION SYSTEMS
STANDARDISATION AND CLASSIFICATION OF ALERTS GENERATED BY INTRUSION DETECTION SYSTEMS Athira A B 1 and Vinod Pathari 2 1 Department of Computer Engineering,National Institute Of Technology Calicut, India
HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK
HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK 1 K.RANJITH SINGH 1 Dept. of Computer Science, Periyar University, TamilNadu, India 2 T.HEMA 2 Dept. of Computer Science, Periyar University,
Development of a Network Intrusion Detection System
Development of a Network Intrusion Detection System (I): Agent-based Design (FLC1) (ii): Detection Algorithm (FLC2) Supervisor: Dr. Korris Chung Please visit my personal homepage www.comp.polyu.edu.hk/~cskchung/fyp04-05/
MINING THE DATA FROM DISTRIBUTED DATABASE USING AN IMPROVED MINING ALGORITHM
MINING THE DATA FROM DISTRIBUTED DATABASE USING AN IMPROVED MINING ALGORITHM J. Arokia Renjit Asst. Professor/ CSE Department, Jeppiaar Engineering College, Chennai, TamilNadu,India 600119. Dr.K.L.Shunmuganathan
Neural networks vs. decision trees for intrusion detection
Neural networks vs. decision trees for intrusion detection Yacine Bouzida Mitsubishi Electric ITE-TCL 1, allée de Beaulieu CS 186 3578, Rennes, France [email protected] Frédéric Cuppens Département
Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup
Network Anomaly Detection A Machine Learning Perspective Dhruba Kumar Bhattacharyya Jugal Kumar KaKta»C) CRC Press J Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor
A survey on Data Mining based Intrusion Detection Systems
International Journal of Computer Networks and Communications Security VOL. 2, NO. 12, DECEMBER 2014, 485 490 Available online at: www.ijcncs.org ISSN 2308-9830 A survey on Data Mining based Intrusion
An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus
An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus Tadashi Ogino* Okinawa National College of Technology, Okinawa, Japan. * Corresponding author. Email: [email protected]
Hybrid Intrusion Detection System Model using Clustering, Classification and Decision Table
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 4 (Mar. - Apr. 2013), PP 103-107 Hybrid Intrusion Detection System Model using Clustering, Classification
Preprocessing Web Logs for Web Intrusion Detection
Preprocessing Web Logs for Web Intrusion Detection Priyanka V. Patil. M.E. Scholar Department of computer Engineering R.C.Patil Institute of Technology, Shirpur, India Dharmaraj Patil. Department of Computer
Finding Frequent Patterns Based On Quantitative Binary Attributes Using FP-Growth Algorithm
R. Sridevi et al Int. Journal of Engineering Research and Applications RESEARCH ARTICLE OPEN ACCESS Finding Frequent Patterns Based On Quantitative Binary Attributes Using FP-Growth Algorithm R. Sridevi,*
NETWORK INTRUSION DETECTION SYSTEM USING HYBRID CLASSIFICATION MODEL
NETWORK INTRUSION DETECTION SYSTEM USING HYBRID CLASSIFICATION MODEL Prof. Santosh T. Waghmode 1, Prof. Vinod S. Wadne 2 Department of Computer Engineering, 1, 2 JSPM s Imperial College of Engineering
A Review on Network Intrusion Detection System Using Open Source Snort
, pp.61-70 http://dx.doi.org/10.14257/ijdta.2016.9.4.05 A Review on Network Intrusion Detection System Using Open Source Snort Sakshi Sharma and Manish Dixit Department of CSE& IT MITS Gwalior, India [email protected],
Adaptive Anomaly Detection for Network Security
International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 5, Number 1 (2013), pp. 1-9 International Research Publication House http://www.irphouse.com Adaptive Anomaly Detection for
Enhancing Quality of Data using Data Mining Method
JOURNAL OF COMPUTING, VOLUME 2, ISSUE 9, SEPTEMBER 2, ISSN 25-967 WWW.JOURNALOFCOMPUTING.ORG 9 Enhancing Quality of Data using Data Mining Method Fatemeh Ghorbanpour A., Mir M. Pedram, Kambiz Badie, Mohammad
KEITH LEHNERT AND ERIC FRIEDRICH
MACHINE LEARNING CLASSIFICATION OF MALICIOUS NETWORK TRAFFIC KEITH LEHNERT AND ERIC FRIEDRICH 1. Introduction 1.1. Intrusion Detection Systems. In our society, information systems are everywhere. They
Keywords - Intrusion Detection System, Intrusion Prevention System, Artificial Neural Network, Multi Layer Perceptron, SYN_FLOOD, PING_FLOOD, JPCap
Intelligent Monitoring System A network based IDS SONALI M. TIDKE, Dept. of Computer Science and Engineering, Shreeyash College of Engineering and Technology, Aurangabad (MS), India Abstract Network security
Static Data Mining Algorithm with Progressive Approach for Mining Knowledge
Global Journal of Business Management and Information Technology. Volume 1, Number 2 (2011), pp. 85-93 Research India Publications http://www.ripublication.com Static Data Mining Algorithm with Progressive
IDS / IPS. James E. Thiel S.W.A.T.
IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods
Building A Smart Academic Advising System Using Association Rule Mining
Building A Smart Academic Advising System Using Association Rule Mining Raed Shatnawi +962795285056 [email protected] Qutaibah Althebyan +962796536277 [email protected] Baraq Ghalib & Mohammed
STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS
STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS SACHIN MALVIYA Student, Department of Information Technology, Medicaps Institute of Science & Technology, INDORE (M.P.)
A Survey on Intrusion Detection System with Data Mining Techniques
A Survey on Intrusion Detection System with Data Mining Techniques Ms. Ruth D 1, Mrs. Lovelin Ponn Felciah M 2 1 M.Phil Scholar, Department of Computer Science, Bishop Heber College (Autonomous), Trichirappalli,
Chapter 6: Episode discovery process
Chapter 6: Episode discovery process Algorithmic Methods of Data Mining, Fall 2005, Chapter 6: Episode discovery process 1 6. Episode discovery process The knowledge discovery process KDD process of analyzing
Intrusion Detection Using Data Mining Along Fuzzy Logic and Genetic Algorithms
IJCSNS International Journal of Computer Science and Network Security, VOL.8 No., February 8 7 Intrusion Detection Using Data Mining Along Fuzzy Logic and Genetic Algorithms Y.Dhanalakshmi and Dr.I. Ramesh
Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise
Unique column combinations
Unique column combinations Arvid Heise Guest lecture in Data Profiling and Data Cleansing Prof. Dr. Felix Naumann Agenda 2 Introduction and problem statement Unique column combinations Exponential search
Using Rough Set and Support Vector Machine for Network Intrusion Detection System Rung-Ching Chen and Kai-Fan Cheng
2009 First Asian Conference on Intelligent Information and Database Systems Using Rough Set and Support Vector Machine for Network Intrusion Detection System Rung-Ching Chen and Kai-Fan Cheng Ying-Hao
131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
Data Mining Approach in Security Information and Event Management
Data Mining Approach in Security Information and Event Management Anita Rajendra Zope, Amarsinh Vidhate, and Naresh Harale Abstract This paper gives an overview of data mining field & security information
Science Park Research Journal
2321-8045 Science Park Research Journal Original Article th INTRUSION DETECTION SYSTEM An Approach for Finding Attacks Ashutosh Kumar and Mayank Kumar Mittra ABSTRACT Traditionally firewalls are used to
VHDL Modeling of Intrusion Detection & Prevention System (IDPS) A Neural Network Approach
VHDL Modeling of Intrusion Detection & Prevention System (IDPS) A Neural Network Approach Tanusree Chatterjee Department of Computer Science Regent Education and Research Foundation Abstract- The rapid
Association Rule Mining
Association Rule Mining Association Rules and Frequent Patterns Frequent Pattern Mining Algorithms Apriori FP-growth Correlation Analysis Constraint-based Mining Using Frequent Patterns for Classification
A Frequency-Based Approach to Intrusion Detection
A Frequency-Based Approach to Intrusion Detection Mian Zhou and Sheau-Dong Lang School of Electrical Engineering & Computer Science and National Center for Forensic Science, University of Central Florida,
Data Mining For Intrusion Detection Systems. Monique Wooten. Professor Robila
Data Mining For Intrusion Detection Systems Monique Wooten Professor Robila December 15, 2008 Wooten 2 ABSTRACT The paper discusses the use of data mining techniques applied to intrusion detection systems.
Bisecting K-Means for Clustering Web Log data
Bisecting K-Means for Clustering Web Log data Ruchika R. Patil Department of Computer Technology YCCE Nagpur, India Amreen Khan Department of Computer Technology YCCE Nagpur, India ABSTRACT Web usage mining
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
A SYSTEM FOR DENIAL OF SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS
Journal homepage: www.mjret.in ISSN:2348-6953 A SYSTEM FOR DENIAL OF SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS P.V.Sawant 1, M.P.Sable 2, P.V.Kore 3, S.R.Bhosale 4 Department
CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA
CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA Professor Yang Xiang Network Security and Computing Laboratory (NSCLab) School of Information Technology Deakin University, Melbourne, Australia http://anss.org.au/nsclab
A Novel Approach for Network Traffic Summarization
A Novel Approach for Network Traffic Summarization Mohiuddin Ahmed, Abdun Naser Mahmood, Michael J. Maher School of Engineering and Information Technology, UNSW Canberra, ACT 2600, Australia, [email protected],[email protected],M.Maher@unsw.
Network- vs. Host-based Intrusion Detection
Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477
Understanding Web personalization with Web Usage Mining and its Application: Recommender System
Understanding Web personalization with Web Usage Mining and its Application: Recommender System Manoj Swami 1, Prof. Manasi Kulkarni 2 1 M.Tech (Computer-NIMS), VJTI, Mumbai. 2 Department of Computer Technology,
ANALYSIS OF PAYLOAD BASED APPLICATION LEVEL NETWORK ANOMALY DETECTION
ANALYSIS OF PAYLOAD BASED APPLICATION LEVEL NETWORK ANOMALY DETECTION Like Zhang, Gregory B. White Department of Computer Science, University of Texas at San Antonio [email protected], [email protected]
USING ROUGH SET AND SUPPORT VECTOR MACHINE FOR NETWORK INTRUSION DETECTION
USING ROUGH SET AND SUPPORT VECTOR MACHINE FOR NETWORK INTRUSION DETECTION Rung-Ching Chen 1, Kai-Fan Cheng 2 and Chia-Fen Hsieh 3 1 Department of Information Management Chaoyang University of Technology
System for Denial-of-Service Attack Detection Based On Triangle Area Generation
System for Denial-of-Service Attack Detection Based On Triangle Area Generation 1, Heena Salim Shaikh, 2 N Pratik Pramod Shinde, 3 Prathamesh Ravindra Patil, 4 Parag Ramesh Kadam 1, 2, 3, 4 Student 1,
Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12
Intrusion Detection Systems and Supporting Tools Ian Welch NWEN 405 Week 12 IDS CONCEPTS Firewalls. Intrusion detection systems. Anderson publishes paper outlining security problems 1972 DNS created 1984
New Matrix Approach to Improve Apriori Algorithm
New Matrix Approach to Improve Apriori Algorithm A. Rehab H. Alwa, B. Anasuya V Patil Associate Prof., IT Faculty, Majan College-University College Muscat, Oman, [email protected] Associate
Developing a hybrid method of Hidden Markov Models and C5.0 as a Intrusion Detection System
, pp.165-174 http://dx.doi.org/10.14257/ijdta.2013.6.5.15 Developing a hybrid method of Hidden Markov Models and C5.0 as a Intrusion Detection System Mahsa Khosronejad, Elham Sharififar, Hasan Ahmadi Torshizi
A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds
International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial
How To Prevent Network Attacks
Ali A. Ghorbani Wei Lu Mahbod Tavallaee Network Intrusion Detection and Prevention Concepts and Techniques )Spri inger Contents 1 Network Attacks 1 1.1 Attack Taxonomies 2 1.2 Probes 4 1.2.1 IPSweep and
Euclidean-based Feature Selection for Network Intrusion Detection
2009 International Conference on Machine Learning and Computing IPCSIT vol3 (2011) (2011) IACSIT Press, Singapore Euclidean-based Feature Selection for Network Intrusion Detection Anirut Suebsing, Nualsawat
Analysis of KDD CUP 99 Dataset using Clustering based Data Mining
, pp.23-34 http://dx.doi.org/10.14257/ijdta.2013.6.5.03 Analysis of KDD CUP 99 Dataset using Clustering based Data Mining Mohammad Khubeb Siddiqui and Shams Naahid College of Computer Engineering and Sciences,
Novel DoS/DDoS Attack Detection and Signature Generation
vel DoS/DDoS Attack Detection and Signature Generation Vijay Katkar Department of Computer Engineering, Bharti Vidyapith Deemed University, Pune S. G. Bhirud, PhD. Department of Computer Engineering V.J.T.I.,
Role of Anomaly IDS in Network
Role of Anomaly IDS in Network SumathyMurugan 1, Dr.M.Sundara Rajan 2 1 Asst. Prof, Department of Computer Science, Thiruthangal Nadar College, Chennai -51. 2 Asst. Prof, Department of Computer Science,
Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks
Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks Lohith Raj S N, Shanthi M B, Jitendranath Mungara Abstract Protecting data from the intruders
A Survey of Intrusion Detection System Using Different Data Mining Techniques
A Survey of Intrusion Detection System Using Different Data Mining Techniques Trupti Phutane, Apashabi Pathan Dept. of Computer Engineering, G.H.Raisoni College of Engineering & Management, Wagholi, India
A Survey on Association Rule Mining in Market Basket Analysis
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 4 (2014), pp. 409-414 International Research Publications House http://www. irphouse.com /ijict.htm A Survey
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 11 (November 2014)
Denial-of-Service Attack Detection Mangesh D. Salunke * Prof. Ruhi Kabra G.H.Raisoni CEM, SPPU, Ahmednagar HOD, G.H.Raisoni CEM, SPPU,Ahmednagar Abstract: A DoS (Denial of Service) attack as name indicates
DEVELOPMENT OF HASH TABLE BASED WEB-READY DATA MINING ENGINE
DEVELOPMENT OF HASH TABLE BASED WEB-READY DATA MINING ENGINE SK MD OBAIDULLAH Department of Computer Science & Engineering, Aliah University, Saltlake, Sector-V, Kol-900091, West Bengal, India [email protected]
Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme
Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme Chunyong Yin 1,2, Yang Lei 1, Jin Wang 1 1 School of Computer & Software, Nanjing University of Information Science &Technology,
A new Approach for Intrusion Detection in Computer Networks Using Data Mining Technique
A new Approach for Intrusion Detection in Computer Networks Using Data Mining Technique Aida Parbaleh 1, Dr. Heirsh Soltanpanah 2* 1 Department of Computer Engineering, Islamic Azad University, Sanandaj
Malware Detection in Android by Network Traffic Analysis
Malware Detection in Android by Network Traffic Analysis Mehedee Zaman, Tazrian Siddiqui, Mohammad Rakib Amin and Md. Shohrab Hossain Department of Computer Science and Engineering, Bangladesh University
Keywords Attack model, DDoS, Host Scan, Port Scan
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com DDOS Detection
Network Intrusion Detection using Data Mining Technique
Network Intrusion Detection using Data Mining Technique Abstract - In recent years, most of the research has been done in the field of Intrusion Detection System (IDS) to detect attacks in network traffic
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of
Intrusion Detection System for Cloud
Intrusion Detection System for Cloud First A. Ms. Deepavali P. Patil, Second B. Prof.A.C.Lomte Dept of Computer BSITOR,Pune Abstract In today s life providing security has become more cumbersome because
Detecting Anomaly IDS in Network using Bayesian Network
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 1, Ver. III (Jan. 2014), PP 01-07 Detecting Anomaly IDS in Network using Bayesian Network [1] Mrs.SumathyMuruganAsst.
International Journal of World Research, Vol: I Issue XIII, December 2008, Print ISSN: 2347-937X DATA MINING TECHNIQUES AND STOCK MARKET
DATA MINING TECHNIQUES AND STOCK MARKET Mr. Rahul Thakkar, Lecturer and HOD, Naran Lala College of Professional & Applied Sciences, Navsari ABSTRACT Without trading in a stock market we can t understand
Network Intrusion Detection Systems
Network Intrusion Detection Systems False Positive Reduction Through Anomaly Detection Joint research by Emmanuele Zambon & Damiano Bolzoni 7/1/06 NIDS - False Positive reduction through Anomaly Detection
NEW TECHNIQUE TO DEAL WITH DYNAMIC DATA MINING IN THE DATABASE
www.arpapress.com/volumes/vol13issue3/ijrras_13_3_18.pdf NEW TECHNIQUE TO DEAL WITH DYNAMIC DATA MINING IN THE DATABASE Hebah H. O. Nasereddin Middle East University, P.O. Box: 144378, Code 11814, Amman-Jordan
Firewalls Netasq. Security Management by NETASQ
Firewalls Netasq Security Management by NETASQ 1. 0 M a n a g e m e n t o f t h e s e c u r i t y b y N E T A S Q 1 pyright NETASQ 2002 Security Management is handled by the ASQ, a Technology developed
How To Detect Denial Of Service Attack On A Network With A Network Traffic Characterization Scheme
Efficient Detection for DOS Attacks by Multivariate Correlation Analysis and Trace Back Method for Prevention Thivya. T 1, Karthika.M 2 Student, Department of computer science and engineering, Dhanalakshmi
Adaptive Network Intrusion Detection System using a Hybrid Approach
Adaptive Network Intrusion Detection System using a Hybrid Approach R Rangadurai Karthick Department of Computer Science and Engineering IIT Madras, India [email protected] Vipul P. Hattiwale Department
SURVEY OF INTRUSION DETECTION SYSTEM
SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT
Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation
Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation Yu Gu, Andrew McCallum, Don Towsley Department of Computer Science, University of Massachusetts, Amherst, MA 01003 Abstract We develop
Coimbatore-47, India. Keywords: intrusion detection,honeypots,networksecurity,monitoring
Volume 4, Issue 8, August 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Investigate the
Efficiently Managing Firewall Conflicting Policies
Efficiently Managing Firewall Conflicting Policies 1 K.Raghavendra swamy, 2 B.Prashant 1 Final M Tech Student, 2 Associate professor, Dept of Computer Science and Engineering 12, Eluru College of Engineeering
Hybrid Model For Intrusion Detection System Chapke Prajkta P., Raut A. B.
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume1 Issue 3 Dec 2012 Page No. 151-155 Hybrid Model For Intrusion Detection System Chapke Prajkta P., Raut A. B.
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015
RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering
International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer
Robust Preprocessing and Random Forests Technique for Network Probe Anomaly Detection
International Journal of Soft Computing and Engineering (IJSCE) Robust Preprocessing and Random Forests Technique for Network Probe Anomaly Detection G. Sunil Kumar, C.V.K Sirisha, Kanaka Durga.R, A.Devi
Data Mining: Foundation, Techniques and Applications
Data Mining: Foundation, Techniques and Applications Lesson 1b :A Quick Overview of Data Mining Li Cuiping( 李 翠 平 ) School of Information Renmin University of China Anthony Tung( 鄧 锦 浩 ) School of Computing
