Finding Frequent Itemsets using Apriori Algorihm to Detect Intrusions in Large Dataset
|
|
|
- Lilian Holland
- 10 years ago
- Views:
Transcription
1 Finding Frequent Itemsets using Apriori Algorihm to Detect Intrusions in Large Dataset Kamini Nalavade1, B.B. Meshram2, Abstract With the growth of hacking and exploiting tools and invention of new ways of intrusion, Intrusion detection and prevention is becoming the major challenge in the world of network security. The increasing network traffic and data on Internet is making this task more demanding. There are various approaches being utilized in intrusion detections, but unfortunately any of the systems so far is not completely flawless. The flase positive rates makes it extremely hard for to analyze and react to attacks. Intrusion detection systems using data mining approaches make it possible to search patterns and rules in large amount of audit data. In this paper, we represent an model to integrate association rules to intrusion detection to design and implement an network intrusion detection system. Our technnique is used to generate attack rules that will detect the attacks in network audit data using anomaly detection. This shows that the association rules mining algorithm is capable of detecting network intrusions. The KDD dataset which is freely available online is used for our experimentation and results are discussed. Our aim is to experiment with dfiiferent parameters of apriori algorithm to build a string intrusion detection system using association rule mining. Keywords Intrusion, Security, Association rule mining, Network, Data mining, Apriori 1. Introduction Communication on Internet, in spite of implementation of advanced security measures, is always under innovative and inventive attacks. Given the different type of attacks like Denial of Service, Probing, Remote to Local, User to Root and others, it is a challenge for any intrusion prevention system to detect a wide variety of attacks. The goal of intrusion detection systems is to automatically detect attack from the continous stream of network data traffic. Once an attack is detected, alarm is generated for administrator. Advanced version Intrusion prevention systems provide actions against the attacks instead of just producing alarms. Two approaches are used for intrusion detection: Misuse detection and Anomaly detection. Generally signature based systems are used to detect known attacks. These methods are pre-coded with signatures of attacks and perform rule matching to detect intrusions. But these kinds of systems are not sufficient to detect new or unknown attacks. Examples of misuse detection include expert systems, keystroke monitoring, and state transition analysis. Anomaly detection systems assume that an intrusion should deviate the system behaviour from its normal pattern. This approach can be implemented using statistical methods, neural networks, predictive pattern generation. In both areas, some form of user intervention is required, such as coding the attacks into the system or checking if the deviation from normal usage is a true attack. As audit logs may contain useful and rich information that can be used to build a better detection model, data mining techniques, which can discover meaningful knowledge in large volumes of data, can be used to analyze the network audit logs. By analyzing the audit logs, meaningful data can be extracted to generate better detection models. When data mining is to be applied to large volumes of network traffic data to search for patterns, it can provide valuable insights to attack patterns, thus allowing us to build a more effective detection model. These insights can identify new signatures as and when they appear, reduce the need of administrator s experience and intuition in detecting a new intrusion, and protect against constantly changing future threats. The major objective of this paper is to build an inrusion detection system using association rule mining. Generating interesting rules from audit data to detect unknown intrusions. We investigate the performance of our intrusion detection system in terms of performance criteria as detection rate and false positive rate. The paper is organised as follows: Section 2 depicts the related work. In section 3 we explain the association rule mining and apriori algorithm for intrusion detection. In section 4 we describe our proposed system for network intrusion and detection. Section 5 illustates the experimentation and results followed by conclusion. Page 84
2 2. Related Work Here a newly developed technique named, The Research on the Application of Association Rules Mining Algorithm in Network Intrusion Detection [6] is discussed. In this paper author have describe about Network Intrusion Detection System (IDS), as the main security defending technique, is second guard for a network after firewall. Since it can discern and respond to the hostile behavior of the computer and network resource, it is a hot area for research network security nowadays. Furthermore author descried about Data mining technology which can be applied to the network intrusion detection, and Precision of the detection will be improved by the superiority of data mining. Basically In this paper, author have presents the study of an example running to contract two algorithms. Presented results have shown that the fuzzy rule mining algorithm is more convenient than Apriori algorithm to mine mass network log database. In [24] paper, authors have integrated two technique data mining and fuzzy technique. Where fuzzy association rules have applied to design and implement an abnormal network intrusion detection system. Here author presents that when the association rules used in traditional information detection cannot effectively deal with changes in network behavior, it will better meet the actual needs of abnormal detection to introduce the concept of fuzzy association rules to strengthen the adaptability. Basically in This paper author mainly focused on the study of Denial of Service (DOS). According to the author s experimental results, they have found that their system can correctly identify all DOS attacks on test after appropriate adjustment of system parameters. Moreover, they have also proved, in the experiment, that their system would not result in false positives under such circumstances as a large amount of instantaneous FTP normal packet flow. In addition, if source of an attacker can be determined, the system will also be able to promptly inform the firewall to alter its rules and cut off the connection. According to another research network security is becoming an increasingly important issue, since the rapid development of the Internet. Network Intrusion Detection System (IDS), as the main security defending technique, is widely used against such malicious attacks. Lee and Stolfo (1998) utilized the basic association rules algorithms to mine rules from system audit data into an aggregate rule set to form the user s normal profile. Two rules are merged if heir right and left hand sides are exactly the same or their RHSs can be combined and LHSs can also be combined, and the support and confidence values are close. For example, service = http src_bytes=20 and service= http src_bytes=30 can be combined into service =http 20 src_bytes 30. Any subsequent system activities are analyzed to mine frequent patterns and the new pattern set is compared with the normal profile. Similarity functions are used to evaluate deviations involving missing or new rules, violation of the rules (same antecedent but different consequent), and significant changes in support of the rules. M.Sulaiman khan, Maybin Muyeba and Frans Coenen[1] described weighted association rule mining from fuzzy data in their paper. Then some other proposed association rule mining for weighted value not necessarily binary value. The value should be continuous or discrete value to be presented in the database. In 2009 Flora S. Tsai [9] described network intrusion detection system using association rule mining in his paper. This helped to generated interesting rules from the KDD data set. 3. Association Rule Mining for Intrusion Detection The main aim of intrusion detection or protection systems is to protect their systems from the threats that come with increasing network connectivity and reliance on information systems. Given the level and nature of modern network security threats, the question for security professionals should not be whether to use intrusion detection, but which intrusion detection features and capabilities to use. IDSs have gained acceptance as a necessary addition to every organization s security infrastructure. Despite the documented contributions intrusion detection technologies make to system security, in many organizations one must still justify the acquisition of IDSs. There are several compelling reasons to acquire and use IDSs: 1. To prevent problem behaviors by increasing the perceived risk of discovery and punishment for those who would attack or otherwise abuse the system. 2. To detect attacks and other security violations that is not prevented by other security measures 3. To detect and deal with the preambles to attacks The main aim is to develop a network based intrusion detection system based on modified Apriori approach for attack detection and test the results. In this section we describe the desin and mehodology of our proposed system Page 85
3 Data mining generally refers to the process of extracting or mining knowledge from a large amount of data. This process first understands the existing data and then predicts the new data. It is the core of Knowledge Discovery and Data mining (KDD). Kind of Patterns found in Data Mining Task are specified by Data Mining Functionalities. In general, data mining tasks are categorized into two categories: predictive and descriptive. The general properties of the data in the database are characterized by Descriptive mining. Inference on the current data in order to make predictions is performed by Predictive mining. Association rule mining. Specifically, two data mining approaches have been proposed and used for anomaly detection : association rules and frequency episodes. Association rule algorithms find correlations between features or attributes used to describe a data set.association rules mining started as a technique for finding interesting rules from transactional databases [1]. Association rule problem: Given a set of items I={I1,I2,,Im} and a database of transactions D={t1,t2,, tn} where ti={ii1,ii2,, Iik} and Iij I, the Association Rule Problem is to identify all association rules X Y with a minimum support and confidence. The support of the rule is the percentage of transactions that contains both X and Y in all transactions and is calculated as X Y / D. The support of the rule measures the significance of the correlation between itemsets. The confidence is the percentage of transactions that contain Y in the transactions that contain X. The confidence of a rule measures the degree of correlation between the itemsets and is calculated as X Y / X. The support is a measure of the frequency of a rule and the confidence is a measure of the strength of the relation between the sets of items. Two Step Process of association rule mining : i) Frequent itemset identification (Support as the criterion): Discover the large (frequent) itemsets that have transaction support above a predefined minimum threshold. Given d items, there are 2 d possible candidate itemsets null A B C D E AB AC AD AE BC BD BE CD CE DE ABC ABD ABE ACD ACE ADE BCD BCE BDE CDE ABCD ABCE ABDE ACDE BCDE ABCDE Page 86 Figure 1. Frequent itemset generation ii) Rule generation from frequent itemset (Confidence as the criterion): Use the obtained large itemsets to generate the association rules that have confidence above a predefined minimum threshold. To discover the association rules from the DARPA dataset, various approaches should be applied for different kind of
4 dataset as follows. A. Association Rule Mining for Binary Value For binary weighted value it is easy to find out the frequent item set. generates The frequent item set is generated by the Apriori algorithm from a large number of data set. In association rules mining weights are considered as the highest priority. In those rules Apriori algorithm can be imagined as two steps. Firstly it generates candidate sets. Secondly, it prunes the entire non-frequent item set after each step using the minimum support and the weight of the item from the data base. Many item sets could be eliminated by the pruning process which are not frequent. B. Association Rule Mining for Continuous Value If a particular attribute takes a value in the range [0 1] it is taken as a continuous attribute in the Tanagra tool. This could be taken as Fuzzy data and hence fuzzy weighted Association rule mining as described in fuzzy mining paper could be used here. The weight of fuzzy data can be defined as Fuzzy Item Weight (FIW). Now Fuzzy Item set Transaction Weight (FITW) is the aggregate weights of all the fuzzy sets associated with the items in the item set present in a single transaction. From this FITW support and Confidence value can be calculated as per generalizing the notion of support. C. Association Rule Mining for Discrete value The normalization of the data becomes very difficult If the range of values that an attribute in the data set can take is very large. The traditional approach to deal with this type of data in association analysis is to convert each value into a set of binary values. The discrete attributes are normalized i.e. we find a set of thresholds that can be used to convert the attributes into a categorical variable. This kind of normalization affects the accuracy of the rule generation technique which may lead to higher misclassification rate. Apriori Algorithm Here I am using apriori algorithm for association rule mining technique to produce association rule There are different types of algorithms used to mine frequent item sets. One of the most popular data mining approaches is to find frequent item sets from a transaction dataset and derive association rules. A finding frequent item set (item sets with frequency larger than or equal to a user specified minimum support) is not trivial because of its combinatorial explosion [14]. Once frequent item-sets are obtained, it is straightforward to generate association rules with confidence larger than or equal to a user specified minimum confidence. Apriori is a seminal algorithm for finding frequent item-sets using candidate generation [1]. It is characterized as a levelwise complete search algorithm using anti-monotonicity of item-sets, if an item-set is not frequent, any of its superset is never frequent. By convention, Apriori assumes that items within a transaction or item-set are sorted in lexicographic order. Let the set of frequent item-sets of size k be Fk and their candidates be Ck. Apriori first scans the database and searches for frequent item-sets of size 1 by accumulating the count for each item and collecting those that satisfy the minimum support requirement. It then iterates on the following three steps and extracts all the frequent item-sets. Apriori Property It is an anti-monotone property: if a set cannot pass a test, all of its supersets will fail the same test as well. It is called anti-monotone because the property is monotonic in the context of failing a test. All nonempty subsets of a frequent itemset must also be frequent. An itemset I is not frequent if it does not satisfy the minimum support threshold: P(I) < min_sup If an item A is added to the itemset I, then the resulting itemset I A cannot occur more frequently than I. Page 87
5 null A B C D E AB AC AD AE BC BD BE CD CE DE Found to be Infrequent ABC ABD ABE ACD ACE ADE BCD BCE BDE CDE ABCD ABCE ABDE ACDE BCDE Pruned supersets ABCDE Figure 2: Apriori frequent itemset generation[10] Pseudo code Ck: Candidate itemset of size k Lk : frequent itemset of size k L1 = {frequent items}; for (k = 1; Lk!=Æ; k++) do - Ck+1 = candidates generated from Lk; - for each transaction t in database do increment the count of all candidates in Ck+1 that are contained in t; endfor; - Lk+1 = candidates in Ck+1 with min_support endfor; return k Lk; Our approach is to implement the Apriori algorithm with minimum resources including hardware and less computational heads. Because apriori algorithm suffers from data complexity problems, i.e. For every step of candidate generation the algorithm has to scan the entire database, and as we are aware that the larger the database the difficult it is to scan completely, therefore candidate generation and candidate pruning are considered to be tedious as it involves bringing new data, after random unexpected intervals of time. We have to also take care that less memory should be utilized during the scanning process. 4. System Evaluation and Results In this section we demonstrate how the system parameters are decided and fixed. Also the different performance parameters used to evaluate the system. Then we discuss the results achieved in intrusion detection using k-means clustering algorithm on KDD cup dataset. Next we evaluated the performance of k-means clustering algorithm with different values of initial cluster. 4.1 Dataset and Normalization of data Page 88
6 The dataset used is KDDcup1999 intrusion dataset which contains wide variety of intrusions simulated in network environment to acquire nine weeks of raw TCP dump data for a local-area network. A connection is a sequence of TCP packets starting and ending at some well-defined times, between which data flows to and from a source IP address to a target IP address. Each connection is labelled as either normal, or as an attack, with exactly one specific attack type. It is important to note that the testing data is not from the same probability distribution as the training data. This makes the task more realistic. The datasets contains a total of 22 training attack types. There are 41 features for each connection record that are divided into discrete sets and continuous sets according to the feature values. The attacks in each class are as shown below: Table 1: Classes of Attacks S.N Class Attack Types 1 DOS Back, Land, Neptune,pod, smurf, Teardrop, 2 U2R Buffer_overflow, loadmodule, perl, rootkit 3 R2L ftp_write, guess_passwd, imap, multihop, phf, spy,warezlient, warezmaster 4 Probe IPsweep,nmap, satan,portsweep It consists of number of total records The 22 different types of network attacks in the KDD99 dataset fall into four main categories: DOS (Denial of Service), Probe, R2L(Remote to Local), U2R(user to remote). In order to know how to read the data from the audit data, we need to analyze how the audit da ta is being recorded. The audit data is processed for data mining purpose and is split into two files, the training set which contains around five million rows and the test set with 10% of the training set. 4.2 Performance Parameters There are many measures available for evaluating system performance. For evaluating intrusion detection results following measure are generally used. 1. True positive (TP) means number connections that were correctly classified as intrusion. 2. True Negative (TN) means number of connections that were incorrectly classified as intrusion. 3. False positive (FP) means number of intrusion connections that were incorrectly classified as normal. 4. False negative FN) means number of normal connections that were incorrectly classified as intrusion. To determine how many misclassification are found we use term Recall. Precision is how many records are correctly classified by the system. Precision=TP/TP+FP..(1) Recall=TP/TP+FN.(2) Accuracy= TP+ TN TP+ TN + FP+ FN...(3) Confusion Matrix for Intrusion Protection System Actual Class Predicted Class Normal Attack Normal TP FN Attack FP TN Table 2: Confusion Matrix We mainly concentrate on false positive rate (fpr), recall, precision and overall accuracy. In the next two sections, we present two sets of experiments, each designed to demonstrate a different point. The first set is used to intrusion detection results using unsupervised anomaly detection method. We also show that clustering methods can be employed to help the performance of classification-based intrusion detection techniques. The second set of results shows that how the different cluster values for k-means algorithm affects the performance of system. Page 89
7 4.3 Experimental results The software framework of this work has been developed with Tanagra tool. Tanagra is a data mining suite build around graphical user interface. Tanagra is particularly strong in statistics, offering a wide range of uni and multivariate parametric and nonparametric tests. Equally impressive is its list of feature selection techniques. Together with a compilation of standard machine learning techniques, it also includes correspondence analysis, principal component analysis, and the partial least squares methods. Tanagra is more powerful, it contains some supervised learning but also other paradigms such as clustering, supervised learning, meta supervised learning, feature selection, data visualization supervised learning assessment, statistics, feature selection and construction algorithms. The rules generated are Figure 3 Apriori Result on KDDcup dataset Page 90 Figure 4 Rules generated from Apriori on continous atributes
8 Tanagra can be considered as a pedagogical tool for learning programming techniques. Figure 5 Rules generated from Association rule mining on selected atributes The figure above shows the rules generated when duration, protocol_type, src_bytes,dst_bytes and label these attributes are selected. We used KDD cup99 dataset to generate rules which contains 42 attributes having continuous and discrete values. Some more interesting results were found when all the attributes of the KDDdataset were selected. We experimented with continous as well as discrete attributes. When all 41 attributes selected we could generate 5932 rules and 1925 frequent itemsets. We are now exploring the techniques for removing redundancy from the generated ruleset. 5. Conclusion and Future Work Currently Network-based intrusion detection detects intrusions based on signatures. Evasion technique is used for detecting new attacks based on the information of known attacks. The aim of our framework is not to break the detection of the NIDS. Research is to implmement association rule mining effectively to build a strong and expert intrusion protection system. In this paper we experimented we discussed the experimental results which we carried out during our research using the KDD cup 1999 dataset and applying the signature Apriori algorithm which is well known and widely used for intrusion detection. This framework used to detect the unknown attacks with high accuracy rate and high efficiency. References R. Aggrawal, T. Imielinski, A. Swami, Mining association rules between sets of items in very large databases, Proceedings of the ACM SIGMOD Conference, [2 L.P. Cordella and C. Sansone, A multi-stage classification system for detecting intrusions in computer networks, Pattern Anal Applic, 10: , [3] L. Portnoy, S. Stolfo, A geometric framework for unsupe rvised anomaly detection: detecting intrusions in unlabeled da ta, In: D. Barbara, S. Jajodia (Eds.), Applications of Data Mining in Computer Security, Kluwer, [4] D. Newman, KDD Cup 1999 Data, The UCI KDD Archive, Information and CS, University Of California, Irvine. Source: [5] Lincoln Laboratory, APRA Intrusion Detection Evaluation, Massachusetts Institute of Technology. Source: [6] L. Portnoy, E. Eskin, S. Stolfo., Intrusion detection with unlabeled data using clustering, Proceedings of ACM CSS Workshop on Data Mining Applied to Security, DMSA [7] F.S. Tsai and C.K. Chan (eds), Cyber Security, Pearson Education, Singapore, [8] F. S. Tsai, K. L. Chan, Detecting cyber security threats in weblogs using probabilistic models, in: Intelligence and Security Informatics, vol. 4430, 2007, pp [9] F. S. Tsai, K. L. Chan, Blog data mining for cyber security threats, in: Data Mining for Business Applications, 2009, pp [10] Y. Wang, Inyoung Kim, G. Mbaten g, S.-Y. Ho, A latent class modeling approach to detect network intrusion, Computer Page 91.Kamini C. Nalavade received the B.E. degree in computer science and engineering from the SGGS, College of engineering and technology, Nanded in 2001 and M.Tech degree in computer engineering from Veermata Jijabai Technological Institute (VJTI), Mumbai in She is currently PhD student in the department of computer Author s Photo
9 engineering, VJTI, Mumbai. Her research interest includes intrusion detection, network security, data mining and data privacy. She have published more than 20 papers in International journals and Conferences. Dr. B. B. Meshram is currently professor and Head of Computer Technology Department of Veermata Jijabai Technological Institute (VJTI), Matunga, Mumbai (INDIA). His areas of interest include Object oriented database management systems, Computer network security and multimedia systems. He has published more than 200 papers in National & International Conferences & refereed Journals. He has submitted more than five patents in his research interest area. Author s Photo Page 92
Mining Association Rules to Evade Network Intrusion in Network Audit Data
Mining Association Rules to Evade Network Intrusion in Network Audit Data Kamini Nalavade 1, B.B. Meshram 2 Abstract With the growth of hacking and exploiting tools and invention of new ways of intrusion,
A Survey on Intrusion Detection System with Data Mining Techniques
A Survey on Intrusion Detection System with Data Mining Techniques Ms. Ruth D 1, Mrs. Lovelin Ponn Felciah M 2 1 M.Phil Scholar, Department of Computer Science, Bishop Heber College (Autonomous), Trichirappalli,
HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK
HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK 1 K.RANJITH SINGH 1 Dept. of Computer Science, Periyar University, TamilNadu, India 2 T.HEMA 2 Dept. of Computer Science, Periyar University,
Data Mining Apriori Algorithm
10 Data Mining Apriori Algorithm Apriori principle Frequent itemsets generation Association rules generation Section 6 of course book TNM033: Introduction to Data Mining 1 Association Rule Mining (ARM)
Application of Data Mining Techniques in Intrusion Detection
Application of Data Mining Techniques in Intrusion Detection LI Min An Yang Institute of Technology [email protected] Abstract: The article introduced the importance of intrusion detection, as well as
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup
Network Anomaly Detection A Machine Learning Perspective Dhruba Kumar Bhattacharyya Jugal Kumar KaKta»C) CRC Press J Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor
Intrusion Detection using Artificial Neural Networks with Best Set of Features
728 The International Arab Journal of Information Technology, Vol. 12, No. 6A, 2015 Intrusion Detection using Artificial Neural Networks with Best Set of Features Kaliappan Jayakumar 1, Thiagarajan Revathi
Data Mining: Partially from: Introduction to Data Mining by Tan, Steinbach, Kumar
Data Mining: Association Analysis Partially from: Introduction to Data Mining by Tan, Steinbach, Kumar Association Rule Mining Given a set of transactions, find rules that will predict the occurrence of
An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework
An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework Jakrarin Therdphapiyanak Dept. of Computer Engineering Chulalongkorn University
Unique column combinations
Unique column combinations Arvid Heise Guest lecture in Data Profiling and Data Cleansing Prof. Dr. Felix Naumann Agenda 2 Introduction and problem statement Unique column combinations Exponential search
KEITH LEHNERT AND ERIC FRIEDRICH
MACHINE LEARNING CLASSIFICATION OF MALICIOUS NETWORK TRAFFIC KEITH LEHNERT AND ERIC FRIEDRICH 1. Introduction 1.1. Intrusion Detection Systems. In our society, information systems are everywhere. They
System for Denial-of-Service Attack Detection Based On Triangle Area Generation
System for Denial-of-Service Attack Detection Based On Triangle Area Generation 1, Heena Salim Shaikh, 2 N Pratik Pramod Shinde, 3 Prathamesh Ravindra Patil, 4 Parag Ramesh Kadam 1, 2, 3, 4 Student 1,
Efficient Security Alert Management System
Efficient Security Alert Management System Minoo Deljavan Anvary IT Department School of e-learning Shiraz University Shiraz, Fars, Iran Majid Ghonji Feshki Department of Computer Science Qzvin Branch,
MINING THE DATA FROM DISTRIBUTED DATABASE USING AN IMPROVED MINING ALGORITHM
MINING THE DATA FROM DISTRIBUTED DATABASE USING AN IMPROVED MINING ALGORITHM J. Arokia Renjit Asst. Professor/ CSE Department, Jeppiaar Engineering College, Chennai, TamilNadu,India 600119. Dr.K.L.Shunmuganathan
STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS
STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS SACHIN MALVIYA Student, Department of Information Technology, Medicaps Institute of Science & Technology, INDORE (M.P.)
A Review on Network Intrusion Detection System Using Open Source Snort
, pp.61-70 http://dx.doi.org/10.14257/ijdta.2016.9.4.05 A Review on Network Intrusion Detection System Using Open Source Snort Sakshi Sharma and Manish Dixit Department of CSE& IT MITS Gwalior, India [email protected],
Performance Evaluation of Intrusion Detection Systems using ANN
Performance Evaluation of Intrusion Detection Systems using ANN Khaled Ahmed Abood Omer 1, Fadwa Abdulbari Awn 2 1 Computer Science and Engineering Department, Faculty of Engineering, University of Aden,
STANDARDISATION AND CLASSIFICATION OF ALERTS GENERATED BY INTRUSION DETECTION SYSTEMS
STANDARDISATION AND CLASSIFICATION OF ALERTS GENERATED BY INTRUSION DETECTION SYSTEMS Athira A B 1 and Vinod Pathari 2 1 Department of Computer Engineering,National Institute Of Technology Calicut, India
Chapter 6: Episode discovery process
Chapter 6: Episode discovery process Algorithmic Methods of Data Mining, Fall 2005, Chapter 6: Episode discovery process 1 6. Episode discovery process The knowledge discovery process KDD process of analyzing
Adaptive Anomaly Detection for Network Security
International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 5, Number 1 (2013), pp. 1-9 International Research Publication House http://www.irphouse.com Adaptive Anomaly Detection for
International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer
Association Analysis: Basic Concepts and Algorithms
6 Association Analysis: Basic Concepts and Algorithms Many business enterprises accumulate large quantities of data from their dayto-day operations. For example, huge amounts of customer purchase data
Preprocessing Web Logs for Web Intrusion Detection
Preprocessing Web Logs for Web Intrusion Detection Priyanka V. Patil. M.E. Scholar Department of computer Engineering R.C.Patil Institute of Technology, Shirpur, India Dharmaraj Patil. Department of Computer
An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus
An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus Tadashi Ogino* Okinawa National College of Technology, Okinawa, Japan. * Corresponding author. Email: [email protected]
A survey on Data Mining based Intrusion Detection Systems
International Journal of Computer Networks and Communications Security VOL. 2, NO. 12, DECEMBER 2014, 485 490 Available online at: www.ijcncs.org ISSN 2308-9830 A survey on Data Mining based Intrusion
Hybrid Intrusion Detection System Model using Clustering, Classification and Decision Table
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 4 (Mar. - Apr. 2013), PP 103-107 Hybrid Intrusion Detection System Model using Clustering, Classification
Understanding Web personalization with Web Usage Mining and its Application: Recommender System
Understanding Web personalization with Web Usage Mining and its Application: Recommender System Manoj Swami 1, Prof. Manasi Kulkarni 2 1 M.Tech (Computer-NIMS), VJTI, Mumbai. 2 Department of Computer Technology,
Conclusions and Future Directions
Chapter 9 This chapter summarizes the thesis with discussion of (a) the findings and the contributions to the state-of-the-art in the disciplines covered by this work, and (b) future work, those directions
131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
VISUALIZE NETWORK ANOMALY DETECTION BY USING K-MEANS CLUSTERING ALGORITHM
VISUALIZE NETWORK ANOMALY DETECTION BY USING K-MEANS CLUSTERING ALGORITHM A. M. Riad 1, Ibrahim Elhenawy 2,Ahmed Hassan 3 and Nancy Awadallah 1 1Faculty of Computer Science and Information Systems, Mansoura
Intrusion Detection System using Log Files and Reinforcement Learning
Intrusion Detection System using Log Files and Reinforcement Learning Bhagyashree Deokar, Ambarish Hazarnis Department of Computer Engineering K. J. Somaiya College of Engineering, Mumbai, India ABSTRACT
Development of a Network Intrusion Detection System
Development of a Network Intrusion Detection System (I): Agent-based Design (FLC1) (ii): Detection Algorithm (FLC2) Supervisor: Dr. Korris Chung Please visit my personal homepage www.comp.polyu.edu.hk/~cskchung/fyp04-05/
Hybrid Model For Intrusion Detection System Chapke Prajkta P., Raut A. B.
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume1 Issue 3 Dec 2012 Page No. 151-155 Hybrid Model For Intrusion Detection System Chapke Prajkta P., Raut A. B.
FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION
FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION Susan M. Bridges [email protected] Rayford B. Vaughn [email protected] 23 rd National Information Systems Security Conference
A SYSTEM FOR DENIAL OF SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS
Journal homepage: www.mjret.in ISSN:2348-6953 A SYSTEM FOR DENIAL OF SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS P.V.Sawant 1, M.P.Sable 2, P.V.Kore 3, S.R.Bhosale 4 Department
Neural networks vs. decision trees for intrusion detection
Neural networks vs. decision trees for intrusion detection Yacine Bouzida Mitsubishi Electric ITE-TCL 1, allée de Beaulieu CS 186 3578, Rennes, France [email protected] Frédéric Cuppens Département
A Web-based Interactive Data Visualization System for Outlier Subspace Analysis
A Web-based Interactive Data Visualization System for Outlier Subspace Analysis Dong Liu, Qigang Gao Computer Science Dalhousie University Halifax, NS, B3H 1W5 Canada [email protected] [email protected] Hai
Building A Smart Academic Advising System Using Association Rule Mining
Building A Smart Academic Advising System Using Association Rule Mining Raed Shatnawi +962795285056 [email protected] Qutaibah Althebyan +962796536277 [email protected] Baraq Ghalib & Mohammed
Euclidean-based Feature Selection for Network Intrusion Detection
2009 International Conference on Machine Learning and Computing IPCSIT vol3 (2011) (2011) IACSIT Press, Singapore Euclidean-based Feature Selection for Network Intrusion Detection Anirut Suebsing, Nualsawat
A new Approach for Intrusion Detection in Computer Networks Using Data Mining Technique
A new Approach for Intrusion Detection in Computer Networks Using Data Mining Technique Aida Parbaleh 1, Dr. Heirsh Soltanpanah 2* 1 Department of Computer Engineering, Islamic Azad University, Sanandaj
Web Forensic Evidence of SQL Injection Analysis
International Journal of Science and Engineering Vol.5 No.1(2015):157-162 157 Web Forensic Evidence of SQL Injection Analysis 針 對 SQL Injection 攻 擊 鑑 識 之 分 析 Chinyang Henry Tseng 1 National Taipei University
Taxonomy of Intrusion Detection System
Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use
WEB APPLICATION FIREWALL
WEB APPLICATION FIREWALL CS499 : B.Tech Project Final Report by Namit Gupta (Y3188) Abakash Saikia (Y3349) under the supervision of Dr. Dheeraj Sanghi submitted to Department of Computer Science and Engineering
AUTONOMOUS NETWORK SECURITY FOR DETECTION OF NETWORK ATTACKS
AUTONOMOUS NETWORK SECURITY FOR DETECTION OF NETWORK ATTACKS Nita V. Jaiswal* Prof. D. M. Dakhne** Abstract: Current network monitoring systems rely strongly on signature-based and supervised-learning-based
COURSE RECOMMENDER SYSTEM IN E-LEARNING
International Journal of Computer Science and Communication Vol. 3, No. 1, January-June 2012, pp. 159-164 COURSE RECOMMENDER SYSTEM IN E-LEARNING Sunita B Aher 1, Lobo L.M.R.J. 2 1 M.E. (CSE)-II, Walchand
SURVEY OF INTRUSION DETECTION SYSTEM
SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT
Enhancing Quality of Data using Data Mining Method
JOURNAL OF COMPUTING, VOLUME 2, ISSUE 9, SEPTEMBER 2, ISSN 25-967 WWW.JOURNALOFCOMPUTING.ORG 9 Enhancing Quality of Data using Data Mining Method Fatemeh Ghorbanpour A., Mir M. Pedram, Kambiz Badie, Mohammad
Robust Preprocessing and Random Forests Technique for Network Probe Anomaly Detection
International Journal of Soft Computing and Engineering (IJSCE) Robust Preprocessing and Random Forests Technique for Network Probe Anomaly Detection G. Sunil Kumar, C.V.K Sirisha, Kanaka Durga.R, A.Devi
Bisecting K-Means for Clustering Web Log data
Bisecting K-Means for Clustering Web Log data Ruchika R. Patil Department of Computer Technology YCCE Nagpur, India Amreen Khan Department of Computer Technology YCCE Nagpur, India ABSTRACT Web usage mining
Data Mining For Intrusion Detection Systems. Monique Wooten. Professor Robila
Data Mining For Intrusion Detection Systems Monique Wooten Professor Robila December 15, 2008 Wooten 2 ABSTRACT The paper discusses the use of data mining techniques applied to intrusion detection systems.
Data Clustering for Anomaly Detection in Network Intrusion Detection
Data Clustering for Anomaly Detection in Network Intrusion Detection Jose F. Nieves Polytechnic University of Puerto Rico Research Alliance in Math and Science Dr. Yu (Cathy) Jiao Applied Software Engineering
Double guard: Detecting Interruptions in N- Tier Web Applications
Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2014-2018 ISSN: 2249-6645 Double guard: Detecting Interruptions in N- Tier Web Applications P. Krishna Reddy 1, T. Manjula 2, D. Srujan Chandra Reddy 3, T. Dayakar
Finding Frequent Patterns Based On Quantitative Binary Attributes Using FP-Growth Algorithm
R. Sridevi et al Int. Journal of Engineering Research and Applications RESEARCH ARTICLE OPEN ACCESS Finding Frequent Patterns Based On Quantitative Binary Attributes Using FP-Growth Algorithm R. Sridevi,*
Association Rule Mining
Association Rule Mining Association Rules and Frequent Patterns Frequent Pattern Mining Algorithms Apriori FP-growth Correlation Analysis Constraint-based Mining Using Frequent Patterns for Classification
Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks
Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks Lohith Raj S N, Shanthi M B, Jitendranath Mungara Abstract Protecting data from the intruders
IDS IN TELECOMMUNICATION NETWORK USING PCA
IDS IN TELECOMMUNICATION NETWORK USING PCA Mohamed Faisal Elrawy 1, T. K. Abdelhamid 2 and A. M. Mohamed 3 1 Faculty of engineering, MUST University, 6th Of October, Egypt [email protected] 2,3
CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA
CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA Professor Yang Xiang Network Security and Computing Laboratory (NSCLab) School of Information Technology Deakin University, Melbourne, Australia http://anss.org.au/nsclab
How To Prevent Network Attacks
Ali A. Ghorbani Wei Lu Mahbod Tavallaee Network Intrusion Detection and Prevention Concepts and Techniques )Spri inger Contents 1 Network Attacks 1 1.1 Attack Taxonomies 2 1.2 Probes 4 1.2.1 IPSweep and
Data Mining Algorithms Part 1. Dejan Sarka
Data Mining Algorithms Part 1 Dejan Sarka Join the conversation on Twitter: @DevWeek #DW2015 Instructor Bio Dejan Sarka ([email protected]) 30 years of experience SQL Server MVP, MCT, 13 books 7+ courses
Data Mining: Foundation, Techniques and Applications
Data Mining: Foundation, Techniques and Applications Lesson 1b :A Quick Overview of Data Mining Li Cuiping( 李 翠 平 ) School of Information Renmin University of China Anthony Tung( 鄧 锦 浩 ) School of Computing
MAXIMAL FREQUENT ITEMSET GENERATION USING SEGMENTATION APPROACH
MAXIMAL FREQUENT ITEMSET GENERATION USING SEGMENTATION APPROACH M.Rajalakshmi 1, Dr.T.Purusothaman 2, Dr.R.Nedunchezhian 3 1 Assistant Professor (SG), Coimbatore Institute of Technology, India, [email protected]
USING ROUGH SET AND SUPPORT VECTOR MACHINE FOR NETWORK INTRUSION DETECTION
USING ROUGH SET AND SUPPORT VECTOR MACHINE FOR NETWORK INTRUSION DETECTION Rung-Ching Chen 1, Kai-Fan Cheng 2 and Chia-Fen Hsieh 3 1 Department of Information Management Chaoyang University of Technology
Predicting the Risk of Heart Attacks using Neural Network and Decision Tree
Predicting the Risk of Heart Attacks using Neural Network and Decision Tree S.Florence 1, N.G.Bhuvaneswari Amma 2, G.Annapoorani 3, K.Malathi 4 PG Scholar, Indian Institute of Information Technology, Srirangam,
Using Rough Set and Support Vector Machine for Network Intrusion Detection System Rung-Ching Chen and Kai-Fan Cheng
2009 First Asian Conference on Intelligent Information and Database Systems Using Rough Set and Support Vector Machine for Network Intrusion Detection System Rung-Ching Chen and Kai-Fan Cheng Ying-Hao
A Novel Approach for Network Traffic Summarization
A Novel Approach for Network Traffic Summarization Mohiuddin Ahmed, Abdun Naser Mahmood, Michael J. Maher School of Engineering and Information Technology, UNSW Canberra, ACT 2600, Australia, [email protected],[email protected],M.Maher@unsw.
Network Intrusion Detection Systems
Network Intrusion Detection Systems False Positive Reduction Through Anomaly Detection Joint research by Emmanuele Zambon & Damiano Bolzoni 7/1/06 NIDS - False Positive reduction through Anomaly Detection
Analysis of KDD CUP 99 Dataset using Clustering based Data Mining
, pp.23-34 http://dx.doi.org/10.14257/ijdta.2013.6.5.03 Analysis of KDD CUP 99 Dataset using Clustering based Data Mining Mohammad Khubeb Siddiqui and Shams Naahid College of Computer Engineering and Sciences,
Role of Anomaly IDS in Network
Role of Anomaly IDS in Network SumathyMurugan 1, Dr.M.Sundara Rajan 2 1 Asst. Prof, Department of Computer Science, Thiruthangal Nadar College, Chennai -51. 2 Asst. Prof, Department of Computer Science,
Radware s Behavioral Server Cracking Protection
Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information
New Matrix Approach to Improve Apriori Algorithm
New Matrix Approach to Improve Apriori Algorithm A. Rehab H. Alwa, B. Anasuya V Patil Associate Prof., IT Faculty, Majan College-University College Muscat, Oman, [email protected] Associate
Data Mining for Network Intrusion Detection
Data Mining for Network Intrusion Detection S Terry Brugger UC Davis Department of Computer Science Data Mining for Network Intrusion Detection p.1/55 Overview This is important for defense in depth Much
How To Use Neural Networks In Data Mining
International Journal of Electronics and Computer Science Engineering 1449 Available Online at www.ijecse.org ISSN- 2277-1956 Neural Networks in Data Mining Priyanka Gaur Department of Information and
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
Network Intrusion Detection using Data Mining Technique
Network Intrusion Detection using Data Mining Technique Abstract - In recent years, most of the research has been done in the field of Intrusion Detection System (IDS) to detect attacks in network traffic
How To Detect Denial Of Service Attack On A Network With A Network Traffic Characterization Scheme
Efficient Detection for DOS Attacks by Multivariate Correlation Analysis and Trace Back Method for Prevention Thivya. T 1, Karthika.M 2 Student, Department of computer science and engineering, Dhanalakshmi
The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack
The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack Asnita Hashim, University of Technology MARA, Malaysia April 14-15, 2011 The Integration of SNORT with K-Means Clustering
Network Intrusion Detection System Using Genetic Algorithm and Fuzzy Logic
Network Intrusion Detection System Using Genetic Algorithm and Fuzzy Logic Mostaque Md. Morshedur Hassan Assistant Professor, Department of Computer Science and IT, Lalit Chandra Bharali College, Guwahati,
Social Media Mining. Data Mining Essentials
Introduction Data production rate has been increased dramatically (Big Data) and we are able store much more data than before E.g., purchase data, social media data, mobile phone data Businesses and customers
Laboratory Module 8 Mining Frequent Itemsets Apriori Algorithm
Laboratory Module 8 Mining Frequent Itemsets Apriori Algorithm Purpose: key concepts in mining frequent itemsets understand the Apriori algorithm run Apriori in Weka GUI and in programatic way 1 Theoretical
Intrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. [email protected] J. Jiang Department
Static Data Mining Algorithm with Progressive Approach for Mining Knowledge
Global Journal of Business Management and Information Technology. Volume 1, Number 2 (2011), pp. 85-93 Research India Publications http://www.ripublication.com Static Data Mining Algorithm with Progressive
A Survey of Intrusion Detection System Using Different Data Mining Techniques
A Survey of Intrusion Detection System Using Different Data Mining Techniques Trupti Phutane, Apashabi Pathan Dept. of Computer Engineering, G.H.Raisoni College of Engineering & Management, Wagholi, India
Data Mining Approach in Security Information and Event Management
Data Mining Approach in Security Information and Event Management Anita Rajendra Zope, Amarsinh Vidhate, and Naresh Harale Abstract This paper gives an overview of data mining field & security information
Using Data Mining for Mobile Communication Clustering and Characterization
Using Data Mining for Mobile Communication Clustering and Characterization A. Bascacov *, C. Cernazanu ** and M. Marcu ** * Lasting Software, Timisoara, Romania ** Politehnica University of Timisoara/Computer
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
Intrusion Detection Using Data Mining Along Fuzzy Logic and Genetic Algorithms
IJCSNS International Journal of Computer Science and Network Security, VOL.8 No., February 8 7 Intrusion Detection Using Data Mining Along Fuzzy Logic and Genetic Algorithms Y.Dhanalakshmi and Dr.I. Ramesh
Performance Analysis of Naive Bayes and J48 Classification Algorithm for Data Classification
Performance Analysis of Naive Bayes and J48 Classification Algorithm for Data Classification Tina R. Patil, Mrs. S. S. Sherekar Sant Gadgebaba Amravati University, Amravati [email protected], [email protected]
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM MS. DIMPI K PATEL Department of Computer Science and Engineering, Hasmukh Goswami college of Engineering, Ahmedabad, Gujarat ABSTRACT The Internet
ANALYSIS OF PAYLOAD BASED APPLICATION LEVEL NETWORK ANOMALY DETECTION
ANALYSIS OF PAYLOAD BASED APPLICATION LEVEL NETWORK ANOMALY DETECTION Like Zhang, Gregory B. White Department of Computer Science, University of Texas at San Antonio [email protected], [email protected]
