Comparative Study of Data Mining and Machine Learning Approach for Anomaly Detection
|
|
|
- Barnard Small
- 10 years ago
- Views:
Transcription
1 60 Comparative Study of Data Mining and Machine Learning Approach for Anomaly 1 Sunil M. Sangve, 2 Ravindra C. Thool 1 Computer Department, Savitribai Phule Pune University, ZCOER Pune, Maharashtra, India 2 Computer Science and Engineering Department, SRTMU,SGGSIE &T, Nanded, Maharashtra, India Abstract - The intrusion detection systems (IDSs) have attracted more researchers from last two decades. The much more work has been done in IDS. But still, there are some problems remain unsolved like false positive rate and detection accuracy. The various approaches are used in developing IDS; some of these are data mining, machine learning, statistic-based, and rule-based approaches. In this paper, we compare the data mining and machine learning approach for detection of anomaly. We have also discussed the challenges in the intrusion detection system. In studied approaches, some papers used both data mining and machine learning approach for developing system, called as hybrid approach. patterns of data that do not give normal behavior. There are various types of anomaly [5]. Point Contextual Collective Keywords - Intrusion Systems (IDSs), Data Mining, Machine Learning, Challenges. 1. Introduction Contextual Attributes Behavioral.Attributes The anomaly detection is a problem of identifying data points and patterns from given dataset which is also known as outlier detection. The anomaly detection technique applied in various domains such as credit card fraud detection, financial turbulence detection, virus or system intrusion discovery, and network monitoring. The anomaly detection is a binary classification problem with two labels normal and anomaly [11]. The intrusion detection system uses the two stages in i. e training and testing. There are three techniques of anomaly detection depending upon labels used. The supervised anomaly detection uses the classification with labeled instances (assign normal or anomaly). The semi-supervised anomaly detection technique develop the model which represents normal behavior from given dataset and then test the instances to be generated by learnt model. The un-supervised anomaly technique is used to detect anomalies in an unlabeled test dataset and make the assumption that majority of instances in dataset are normal [8]. The anomaly is defined as the 1.1 Point Fig. 1 Types of Anomaly The data instance considered as anomalous with respect to remaining data. The real time example is credit card fraud detection. Consider dataset of individual s credit card transaction containing one feature (amount spent). If the amount spent transaction is more compared to normal range of expenditure for that person, then it will be a point anomaly. 1.2 Contextual If the data occurrence is abnormal for specific context and not for other, known as contextual anomalies that determines the position of an instance on the entire sequence. It has two types contextual attributes and behavioral attributes. The contextual attributes are used to
2 61 determine the context for that instance, for example timeseries data, time is a contextual, and the behavioral attributes specify the non-contextual features of an instance. The example is a spatial data set which describes the average rainfall of the world, the total rainfall at any place is a behavioral attribute. 1.3 Collective If a collection of related data instances is anomalous with respect to the entire data set is known as Collective anomalies. For example, KDD Cup 99 dataset consists of a vector with 41 attributes like source packets, destination packets, protocol, f lag etc. 2. Our Contribution We have studied the two approaches for anomaly detection i.e. data mining and machine learning techniques along with benefits and limitations. We have studied the literature that uses the hybrid approach. The data mining approach is used for large dataset. If large dataset divides into small training dataset, it is possible to decrease the time and computational complexity. The data mining anomaly detection gives the supervised, semi-supervised and unsupervised anomaly detection methods. The machine learning is used to train the system without human interference. If both the approaches are used together then system will become more efficient and effective. 3. Data Mining Approaches in IDS There are various approaches used in intrusion detection system like statistic-based, data mining, machine learning, and heuristic-based approach. Amongst these approaches, we are discussing data mining and machine learning approaches. The use of data-mining in IDS: 1. The dataset is very large and contain valuable patterns which later discovered automatically. 2. Manual updating of data is not easy. Thus, classification and clustering algorithms are used in training stages. Jungsuk Song et al. [1], proposed a more practical unsupervised anomaly detection system. The unsupervised anomaly detection technique construct the IDS models with unlabeled training data automatically and detects the unknown attacks for example, 0-day attacks. They resolved the problem of tuning and optimization of parameters which are required for building of IDS process. The results are calculated on real traffic data, received from Kyoto university honeypots. 3.1 The Adaptive Approach The adaptive detection approach was proposed by Ji zang et al. [2]. The importance of real-life big data sets have increased and gained a lot of research interest in data mining. From large dataset, it is very difficult to extract required knowledge and patterns for detection of network traffic anomalies. The authors studied this problem and proposed new method based on outlier detection, called as adaptive stream projected outlier detectors (A-spot). They used 1999 KDD Cup dataset and consider the parameter for training data generation, anomaly classification and false positive reduction. The A-spot is categorized in two steps: learning and detection. Labeled Training Dataset Offline learning Learning step Sparse Subspace Template (SST) Fig. 2 Adaptive Approach a) Unsupervised Method A-Spot Online Learning Unlabeled Training Dataset Unsupervised Method K-mean Clustering :For identification of clustered features Step
3 62 Feature Selection Method a) Naive Bayes with ranking of relevant features b) Statistic: ranking of significant features. b) Feature Selection Method c) Supervised Method Fig. 3 Effect-based feature identification method (combing the above methods given in Fig 3 a),b) and c)) A-spot uses Sparse Subspace Template (SST), created by using both labeled and unlabeled training data. As SST developed, A-spot start to identify the anomalies which are arrived from data. The incoming data update the data synopsis i. e data characteristics of anomaly detection. The data is called anomaly if data synopsis is less than predefined threshold. The outlier repository used to store detected anomalies. 3.2 Effect-based Feature Identification Proposed by Panos et al. [3], in which anomaly detection technique (ADT) with K-mean, Naïve-Bayes feature selection and C4.5 decision tree for increasing detection accuracy and creates awareness between cyber network operators. This approach is implemented using three stages: 1. Unsupervised method 2. Feature selection method 3. Supervised method Supervised Method a) C4.5 decision tree classification: to evaluate important subsets of attack features. The unsupervised method uses K-mean clustering for identification of clustered features. The feature selection method uses Naïve Bayes with ranking of relevant features and statistic for ranking of significant features. 3.3 Hybrid K-mean Algorithm in Content-centric Networks Amin Karami et al. [4] proposed a novel fuzzy approach for anomaly detection. The K-mean algorithm has some limitations in selection of cluster centroid. The Fuzzy approach uses the following two steps for anomaly detection: 1. To determine optimal number of clusters, hybridization of particle swarm optimization (PSO) and K-mean clustering together, in training phase. 2. In second phase, fuzzy approach is used by taking two distance based methods, as classification and outlier, in detection phase. If optimal result is greater than threshold then data is anomalous otherwise normal. They calculated detection rate and false positive rate. The main challenges in developing IDS are false positive rate, false negative rate and data overload. The development of unique signature is very hard task. If instances are normal and detected as abnormal then they are called as false positive rate. If system is not generated the alarm when attack takes place, known as false negative. The data overload does not relate to detection, but it is very important that analyst can consider all types of data very effectively. The problems in IDS using data mining approaches are [5]: 1. To define a normal region which consist of all possible normal behaviors. 2. The boundary between normal and abnormal also not precisely defined. So, anomalous observation which is close to boundary may be normal. 3. The labeled data which is available for training and testing in anomaly detection is also a big issue. 4. The data contains a noise and looks similar to actual anomalies. It is very difficult to distinguish and remove. In the research of IDS, the various factors are considered like nature of data, availability of labeled data, types of anomalies detected. 4. Machine Learning Approaches 4.1 Advantages of Machine Learning Approach 1. The signature-based IDS depend on humans to create, test and deploy signature manually.
4 63 2. To generate new signature may require hours of time or days. To provide human independent solution machine learning approach is used. 3. Machine learning approach has the ability to develop the system that learns from previous data and give the feedback for unknown data. 4. It consists of neural network, support vector machine, genetic algorithm, fuzzy logic, Bayesian network, decision tree. 5. The machine learning approach popular for many real time problems, based on both explicit and implicit model. 4.2 Neuro-Fuzzy Intrusion System Fuzzy set theory is used for approximate reasoning instead of prediction. The features are considered as fuzzy variables. It is very useful in probes related attacks but it requires high resource consumption. The fuzzy logic specified as if {condition} then consequence, where condition= fuzzy variable, consequence= fuzzy set. Varun Chandola et al. [6], proposed hybrid approach for anomaly detection. They combined two techniques i. e Artificial Neural Network and Fuzzy inference system and used SNORT (Libcap- based sniffer and logger) tool to perform real time traffic analysis with DARPA 1998 dataset. between the un-trusted and trusted system. It performs address translation, mapping of IP address to valid IP address. 4.3 Self Organizing Maps (SOMs) and Particle Swarm Optimization (PSO) M. Lofti Shaherza et al. [7], proposed an unsupervised neural network approaches by combing self organizing maps (SOMs) and particle swarm optimization (PSO). In the SOM, the single layers of neurons are arranged in rectangular array. It checks the input patterns and calculates weight to match input. The neurons which has more similarity, is declared as winner. The SOMs reduced the information with keeping most important topological relationships and trained with unsupervised learning. It is very efficient in handling large dataset. The PSO are developed through simplified social model simulation. The particle is initializing with random position and velocities. It is effective in non-linear optimization problems and also easy to implement. The PSO applied in various domains like genetic algorithm, fuzzy system control and ANN training. Genetic Algorithm includes evolutionary algorithm techniques. It is capable for deriving classification rules and selects optimal parameters for IDS. Steps: 1. Collect the information from specific network. 2. IDS apply trained GA along with classification rules. 3. Use the set of rules to classify normal and abnormal patterns. 4.4 Entropy and Support Vector Machine Approach Fig. 4: Neuro-Fuzzy IDS [6] The approach consists of proxy server, internet, LAN, IDS components. The LAN gives the connection between nodes with Ethernet topology; internet is a gateway to the external world. The IDS learns the new types of attacks without disturbing previously trained knowledge. IDS update the technology by using if-then fuzzy rules. The proxy server used to identify application or a packet and if that particular service available then allowed to pass through. Because of this, there is no direct connection Basant Agarwalet et al. [10], hybrid approach for anomaly detection using support vector machine (SVM) and entropy of network features has been proposed. The normalized entropy values of different network features are measured. The SVM model is trained for identification of normal and anomalous traffic. For detection MIT Lincoln Laboratory dataset is used (DARPA, 1999) Entropy based Intrusion System Entropy is a measurement of randomness. If entropy of network features deviate from a threshold value, then it indicates abnormality in the network traffic i.e. anomaly in the network traffic. The network features considered for detections are packet size, source IP address, source port
5 64 number, destination IP address, destination port number, and packet type (ICMP, TCP, and UDP) Support Vector Machine Based Intrusion It is a useful classification technique and gives prediction of normal or anomaly traffic. The network features considered for detections are source IP address, source port number, destination IP address, destination port number,, packet size, different packets with same size, packet type (ICMP, TCP, and UDP). By combining these two techniques, system gives better result for detection of anomaly and false alarm rate. Ujwala Ravale et al. [9], proposed hybrid technique combines data mining approaches like K Means clustering algorithm and RBF kernel function of Support Vector Machine as a classification module. This technique decreases the number of features associates with data instances. They calculated detection accuracy using KDD Cup 99 dataset. In first stage, they group the data instances depending on their behaviors by utilizing K- Means clustering and in next stage, RBF kernel is used for classification of anomaly and normal data packets. The K- Means clustering technique reduces large heterogeneous dataset to a number of small homogeneous subsets. Table 1: Machine Learning Methodologies. Processing References Strategy S. C. Lee and D. V. Heinbuch [12] J. Q. Xian et al. [13] M. Amini et al. [14] W. Chimphlee et al. [15] Liu et al. [16] R. C.Chen et al. [17] S. Mabu et al. [18] methodology Neural network based intrusion detection. Intrusion detection based on clonal selection clustering algorithm Unsupervised neural network intrusion detection using Fuzzy Rough Clustering Neural network based intrusion detection. Rough set and support vector machine is used for intrusion detection Fuzzy Class- Association-Rule Mining Using Genetic Network Programming Dataset used Network traffic Nature Simulated data Packet based Non-real time KDD Cup 99, real life Packet based Real time DARPA 98 Packet based Non-real time A. Visconti and H. Tahayori [19] - type-2 fuzzy set Real life Packet based Non-real time F. Geramiraz et al. [20] - Fuzzy controller
6 65 5. Conclusions Considering the studied literature, it is clear that in order to have the capacity to secure a system against the novel attacks, the anomaly based intrusion detection is the best way. We have discussed the data mining and machine learning approach for anomaly detection. The data mining approaches are used for clustering and classification to divide the large dataset so that processing and computational complexity will reduce. The machine learning approach trains the system and gives the prediction in testing stage. The machine learning has many advantages in anomaly detection without human interference. Depending on labels used in input dataset, the anomaly detection is classified as supervised, semisupervised, and un-supervised. We are also focusing on combining the best features from data mining and machine learning approach and will propose the hybrid approach which gives better result than discussing methodology. References [1] Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Koji Nakao, Toward a more practical unsupervised anomaly detection system, Information Sciences 231 (2013) 4 14 [2] Ji Zhang, Hongzhou Li, Qigang Gao, Hai Wang, Yonglong Luo, Detecting anomalies from big network traffic data using an adaptive detection approach, Information Sciences 318 (2015) [3] Panos Louvieris, Natalie Clewley, Xiaohui Liu, Effects-based Feature Identification for Network Intrusion, Neurocomputing121(2013) [4] Amin Karami, Manel Guerrero-Zapata, A Fuzzy Anomaly System based on Hybrid PSO- Kmeans Algorithm in Content-Centric Networks, Neurocomputing149 (2015) [5] Sampada Chavan, Khusbu Shah, Neha Dave, Sanghamitra Mukherjee, Ajith Abraham and Sugata Sanyal, Anomaly : A Survey, ACM Comput. Surv. 41, 3, Article 15 (July 2009), 58 pages. DOI = / [6] Varun Chandola, Arindam Banerjee, and Vipin Kumar, Adaptive Neuro-Fuzzy Intrusion Systems, IEEE(ITCC 2004), Proceedings of ITCC 2004, Vol. 1, April, 2004, Las Vegas, Nevada, USA pp [7] M. Lotfi Shahreza, D. Moazzami, B. Moshiri, M.R. Delav, Anomaly detection Using a Self-Organizing Map and Particle Swarm Optimization, Scientia Iranica D (2011) 18 (6), [8] Xiaojin, Zhu Semi-supervised learning literature survey, Computer Sciences TR 1530, University of Wisconsin Madison, Last modified on July 19 (2008). [9] Ujwala Ravale, Nilesh Marathe, Puja Padiya, Feature Selection Based Hybrid Anomaly Intrusion System Using K Means and RBF Kernel Function, Procedia Computer Science 45 ( 2015 ) [10] Basant Agarwal, Namita Mittal, Hybrid Approach for of Anomaly Network Traffic using Data Mining Techniques,Procedia Technology 6 ( 2012 ) [11] Zhe Yao, Philip Mark, and Michael Rabbat, Anomaly Using Proximity Graph and PageRank Algorithm,IEEE transactions on information forensics and security, vol. 7, no. 4, august [12] S. C. Lee and D. V. Heinbuch, Training a Neuralnetwork based Intrusion Detector to Recognize Novel Attacks, IEEE Trans. Syst. Man Cybern. A, vol. 31, no. 4, pp , [13] J. Q. Xian, F. H. Lang, and X. L. Tang, A Novel Intrusion Method based on Clonal Selection Clustering Algorithm, in Proc.(ICMLC).USA: IEEE Press, 2005, vol.6. [14] M. Amini, R. Jalili, and H. R. Shahriari, RT-UNNID: A Practical Solution to Real-Time Network-based Intrusion using Unsupervised Neural Networks, Computers & Security, vol. 25, no. 6, pp ,2006. [15] W. Chimphlee, A. H. Abdullah, M. S. M. Noor, S. Srinoy, and S. Chimphlee, Anomaly-Based Intrusion using Fuzzy Rough Clustering, in Proc (ICHIT), vol. 01. Washington, DC, USA: IEEE Computer Society, 2006, pp [16] G. Liu, Z. Yi, and S. Yang, A Hierarchical Intrusion Model based on the PCA Neural Networks, Neurocomputing, vol. 70, no. 7-9, pp , [17] R. C. Chen, K. F. Cheng, Y. H. Chen, and C. F. Hsieh, Using Rough Set and Support Vector Machine for Network Intrusion System, in Proc. (FACIIDS). Washington, DC, USA: IEEE Computer Society, 2009, pp [18] S. Mabu, C. Chen, N. Lu, K. Shimada, and K. Hirasawa, An Intrusion- Model Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming, IEEE Trans. Syst. Man Cybern. Part C Appl. Rev., vol. 41, no. 1, pp , [19] A. Visconti and H. Tahayori, Artificial Immune System Based on Interval Type-2 Fuzzy Set Paradigm, Applied Soft Computing, vol. 11, no. 6, pp , September [20] F. Geramiraz, A. S. Memaripour, and M. Abbaspour, Adaptive Anomaly-Based Intrusion System Using Fuzzy Controller, International Journal of Network Security, vol. 14, no. 6, pp , 2012.
Adaptive Neuro-Fuzzy Intrusion Detection Systems
Adaptive Neuro-Fuzzy Intrusion Detection Systems Sampada Chavan, Khusbu Shah, Neha Dave and Sanghamitra Mukherjee Institute of Technology for Women, SNDT University, India Ajith Abraham Department of Computer
Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup
Network Anomaly Detection A Machine Learning Perspective Dhruba Kumar Bhattacharyya Jugal Kumar KaKta»C) CRC Press J Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor
The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack
The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack Asnita Hashim, University of Technology MARA, Malaysia April 14-15, 2011 The Integration of SNORT with K-Means Clustering
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 11 (November 2014)
Denial-of-Service Attack Detection Mangesh D. Salunke * Prof. Ruhi Kabra G.H.Raisoni CEM, SPPU, Ahmednagar HOD, G.H.Raisoni CEM, SPPU,Ahmednagar Abstract: A DoS (Denial of Service) attack as name indicates
A new Approach for Intrusion Detection in Computer Networks Using Data Mining Technique
A new Approach for Intrusion Detection in Computer Networks Using Data Mining Technique Aida Parbaleh 1, Dr. Heirsh Soltanpanah 2* 1 Department of Computer Engineering, Islamic Azad University, Sanandaj
Adaptive Anomaly Detection for Network Security
International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 5, Number 1 (2013), pp. 1-9 International Research Publication House http://www.irphouse.com Adaptive Anomaly Detection for
A survey on Data Mining based Intrusion Detection Systems
International Journal of Computer Networks and Communications Security VOL. 2, NO. 12, DECEMBER 2014, 485 490 Available online at: www.ijcncs.org ISSN 2308-9830 A survey on Data Mining based Intrusion
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015
RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
KEITH LEHNERT AND ERIC FRIEDRICH
MACHINE LEARNING CLASSIFICATION OF MALICIOUS NETWORK TRAFFIC KEITH LEHNERT AND ERIC FRIEDRICH 1. Introduction 1.1. Intrusion Detection Systems. In our society, information systems are everywhere. They
HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK
HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK 1 K.RANJITH SINGH 1 Dept. of Computer Science, Periyar University, TamilNadu, India 2 T.HEMA 2 Dept. of Computer Science, Periyar University,
Intrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. [email protected] J. Jiang Department
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer
Credit Card Fraud Detection Using Self Organised Map
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 13 (2014), pp. 1343-1348 International Research Publications House http://www. irphouse.com Credit Card Fraud
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
A Survey on Outlier Detection Techniques for Credit Card Fraud Detection
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. VI (Mar-Apr. 2014), PP 44-48 A Survey on Outlier Detection Techniques for Credit Card Fraud
A Survey on Intrusion Detection System with Data Mining Techniques
A Survey on Intrusion Detection System with Data Mining Techniques Ms. Ruth D 1, Mrs. Lovelin Ponn Felciah M 2 1 M.Phil Scholar, Department of Computer Science, Bishop Heber College (Autonomous), Trichirappalli,
Network Intrusion Detection Using an Improved Competitive Learning Neural Network
Network Intrusion Detection Using an Improved Competitive Learning Neural Network John Zhong Lei and Ali Ghorbani Faculty of Computer Science University of New Brunswick Fredericton, NB, E3B 5A3, Canada
Conclusions and Future Directions
Chapter 9 This chapter summarizes the thesis with discussion of (a) the findings and the contributions to the state-of-the-art in the disciplines covered by this work, and (b) future work, those directions
A Novel Approach for Network Traffic Summarization
A Novel Approach for Network Traffic Summarization Mohiuddin Ahmed, Abdun Naser Mahmood, Michael J. Maher School of Engineering and Information Technology, UNSW Canberra, ACT 2600, Australia, [email protected],[email protected],M.Maher@unsw.
Network Intrusion Detection Systems
Network Intrusion Detection Systems False Positive Reduction Through Anomaly Detection Joint research by Emmanuele Zambon & Damiano Bolzoni 7/1/06 NIDS - False Positive reduction through Anomaly Detection
CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA
CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA Professor Yang Xiang Network Security and Computing Laboratory (NSCLab) School of Information Technology Deakin University, Melbourne, Australia http://anss.org.au/nsclab
Social Media Mining. Data Mining Essentials
Introduction Data production rate has been increased dramatically (Big Data) and we are able store much more data than before E.g., purchase data, social media data, mobile phone data Businesses and customers
Efficient Security Alert Management System
Efficient Security Alert Management System Minoo Deljavan Anvary IT Department School of e-learning Shiraz University Shiraz, Fars, Iran Majid Ghonji Feshki Department of Computer Science Qzvin Branch,
An Overview of Knowledge Discovery Database and Data mining Techniques
An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,
Predicting the Risk of Heart Attacks using Neural Network and Decision Tree
Predicting the Risk of Heart Attacks using Neural Network and Decision Tree S.Florence 1, N.G.Bhuvaneswari Amma 2, G.Annapoorani 3, K.Malathi 4 PG Scholar, Indian Institute of Information Technology, Srirangam,
A SYSTEM FOR DENIAL OF SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS
Journal homepage: www.mjret.in ISSN:2348-6953 A SYSTEM FOR DENIAL OF SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS P.V.Sawant 1, M.P.Sable 2, P.V.Kore 3, S.R.Bhosale 4 Department
A Dynamic Flooding Attack Detection System Based on Different Classification Techniques and Using SNMP MIB Data
International Journal of Computer Networks and Communications Security VOL. 2, NO. 9, SEPTEMBER 2014, 279 284 Available online at: www.ijcncs.org ISSN 2308-9830 C N C S A Dynamic Flooding Attack Detection
Hybrid Intrusion Detection System Model using Clustering, Classification and Decision Table
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 4 (Mar. - Apr. 2013), PP 103-107 Hybrid Intrusion Detection System Model using Clustering, Classification
Honey Bee Intelligent Model for Network Zero Day Attack Detection
Honey Bee Intelligent Model for Network Zero Day Attack Detection 1 AMAN JANTAN, 2 ABDULGHANI ALI AHMED School of Computer Sciences, Universiti Sains Malaysia (USM), Penang, Malaysia 1 [email protected],
An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus
An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus Tadashi Ogino* Okinawa National College of Technology, Okinawa, Japan. * Corresponding author. Email: [email protected]
Manjeet Kaur Bhullar, Kiranbir Kaur Department of CSE, GNDU, Amritsar, Punjab, India
Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Multiple Pheromone
Keywords - Intrusion Detection System, Intrusion Prevention System, Artificial Neural Network, Multi Layer Perceptron, SYN_FLOOD, PING_FLOOD, JPCap
Intelligent Monitoring System A network based IDS SONALI M. TIDKE, Dept. of Computer Science and Engineering, Shreeyash College of Engineering and Technology, Aurangabad (MS), India Abstract Network security
Hybrid Model For Intrusion Detection System Chapke Prajkta P., Raut A. B.
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume1 Issue 3 Dec 2012 Page No. 151-155 Hybrid Model For Intrusion Detection System Chapke Prajkta P., Raut A. B.
An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation
An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation Shanofer. S Master of Engineering, Department of Computer Science and Engineering, Veerammal Engineering College,
NETWORK INTRUSION DETECTION SYSTEM USING HYBRID CLASSIFICATION MODEL
NETWORK INTRUSION DETECTION SYSTEM USING HYBRID CLASSIFICATION MODEL Prof. Santosh T. Waghmode 1, Prof. Vinod S. Wadne 2 Department of Computer Engineering, 1, 2 JSPM s Imperial College of Engineering
Network Intrusion Detection using Semi Supervised Support Vector Machine
Network Intrusion Detection using Semi Supervised Support Vector Machine Jyoti Haweliya Department of Computer Engineering Institute of Engineering & Technology, Devi Ahilya University Indore, India ABSTRACT
Survey of Data Mining Approach using IDS
Survey of Data Mining Approach using IDS 1 Raman kamboj, 2 Kamal Kumar Research Scholar, Assistant Professor SDDIET, Department of Computer Science & Engineering, Kurukshetra Universty Abstract - In our
Research Article Traffic Analyzing and Controlling using Supervised Parametric Clustering in Heterogeneous Network. Coimbatore, Tamil Nadu, India
Research Journal of Applied Sciences, Engineering and Technology 11(5): 473-479, 215 ISSN: 24-7459; e-issn: 24-7467 215, Maxwell Scientific Publication Corp. Submitted: March 14, 215 Accepted: April 1,
Bandwidth based Distributed Denial of Service Attack Detection using Artificial Immune System
Bandwidth based Distributed Denial of Service Attack Detection using Artificial Immune System 1 M.Yasodha, 2 S. Umarani 1 PG Scholar, Department of Information Technology, Maharaja Engineering College,
An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework
An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework Jakrarin Therdphapiyanak Dept. of Computer Engineering Chulalongkorn University
Role of Anomaly IDS in Network
Role of Anomaly IDS in Network SumathyMurugan 1, Dr.M.Sundara Rajan 2 1 Asst. Prof, Department of Computer Science, Thiruthangal Nadar College, Chennai -51. 2 Asst. Prof, Department of Computer Science,
Robust Preprocessing and Random Forests Technique for Network Probe Anomaly Detection
International Journal of Soft Computing and Engineering (IJSCE) Robust Preprocessing and Random Forests Technique for Network Probe Anomaly Detection G. Sunil Kumar, C.V.K Sirisha, Kanaka Durga.R, A.Devi
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Jaimin K. Khatri IT Systems and Network Security GTU PG School, Ahmedabad, Gujarat, India Mr. Girish Khilari Senior Consultant,
Knowledge Based System for Detection and Prevention of DDoS Attacks using Fuzzy logic
Knowledge Based System for Detection and Prevention of DDoS Attacks using Fuzzy logic Amit Khajuria 1, Roshan Srivastava 2 1 M. Tech Scholar, Computer Science Engineering, Lovely Professional University,
Impact of Feature Selection on the Performance of Wireless Intrusion Detection Systems
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Impact of Feature Selection on the Performance of ireless Intrusion Detection Systems
Comparative Analysis of Hybrid Intrusion Detection System and Intrusion Prevention System
Comparative Analysis of Hybrid Intrusion Detection System and Intrusion Prevention System for MANET Pallavi P Puri 1, Nitin R. Chopde 2 ¹Student of Master of Engineering (Computer Science & Engineering),
Network Intrusion Simulation Using OPNET
Network Intrusion Simulation Using OPNET Shabana Razak, Mian Zhou, Sheau-Dong Lang* School of Electrical Engineering & Computer Science and National Center for Forensic Science* University of Central Florida,
STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS
STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS SACHIN MALVIYA Student, Department of Information Technology, Medicaps Institute of Science & Technology, INDORE (M.P.)
Identifying Peer-to-Peer Traffic Based on Traffic Characteristics
Identifying Peer-to-Peer Traffic Based on Traffic Characteristics Prof S. R. Patil Dept. of Computer Engineering SIT, Savitribai Phule Pune University Lonavala, India [email protected] Suraj Sanjay Dangat
Performance Evaluation of Intrusion Detection Systems using ANN
Performance Evaluation of Intrusion Detection Systems using ANN Khaled Ahmed Abood Omer 1, Fadwa Abdulbari Awn 2 1 Computer Science and Engineering Department, Faculty of Engineering, University of Aden,
A Study of Web Log Analysis Using Clustering Techniques
A Study of Web Log Analysis Using Clustering Techniques Hemanshu Rana 1, Mayank Patel 2 Assistant Professor, Dept of CSE, M.G Institute of Technical Education, Gujarat India 1 Assistant Professor, Dept
Internet Worm Classification and Detection using Data Mining Techniques
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. 1 (May Jun. 2015), PP 76-81 www.iosrjournals.org Internet Worm Classification and Detection
DATA MINING TECHNIQUES AND APPLICATIONS
DATA MINING TECHNIQUES AND APPLICATIONS Mrs. Bharati M. Ramageri, Lecturer Modern Institute of Information Technology and Research, Department of Computer Application, Yamunanagar, Nigdi Pune, Maharashtra,
A Neural Network Based System for Intrusion Detection and Classification of Attacks
A Neural Network Based System for Intrusion Detection and Classification of Attacks Mehdi MORADI and Mohammad ZULKERNINE Abstract-- With the rapid expansion of computer networks during the past decade,
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
Keywords Attack model, DDoS, Host Scan, Port Scan
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com DDOS Detection
Bisecting K-Means for Clustering Web Log data
Bisecting K-Means for Clustering Web Log data Ruchika R. Patil Department of Computer Technology YCCE Nagpur, India Amreen Khan Department of Computer Technology YCCE Nagpur, India ABSTRACT Web usage mining
How To Prevent Network Attacks
Ali A. Ghorbani Wei Lu Mahbod Tavallaee Network Intrusion Detection and Prevention Concepts and Techniques )Spri inger Contents 1 Network Attacks 1 1.1 Attack Taxonomies 2 1.2 Probes 4 1.2.1 IPSweep and
A Survey of Intrusion Detection System Using Different Data Mining Techniques
A Survey of Intrusion Detection System Using Different Data Mining Techniques Trupti Phutane, Apashabi Pathan Dept. of Computer Engineering, G.H.Raisoni College of Engineering & Management, Wagholi, India
The Data Mining Process
Sequence for Determining Necessary Data. Wrong: Catalog everything you have, and decide what data is important. Right: Work backward from the solution, define the problem explicitly, and map out the data
Intrusion Detection. Jeffrey J.P. Tsai. Imperial College Press. A Machine Learning Approach. Zhenwei Yu. University of Illinois, Chicago, USA
SERIES IN ELECTRICAL AND COMPUTER ENGINEERING Intrusion Detection A Machine Learning Approach Zhenwei Yu University of Illinois, Chicago, USA Jeffrey J.P. Tsai Asia University, University of Illinois,
Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis Zhiyuan Tan 1,2, Aruna Jamdagni 1,2, Xiangjian He 1, Priyadarsi Nanda 1, and Ren Ping Liu 2 1 Centre for Innovation in IT Services
AUTONOMOUS NETWORK SECURITY FOR DETECTION OF NETWORK ATTACKS
AUTONOMOUS NETWORK SECURITY FOR DETECTION OF NETWORK ATTACKS Nita V. Jaiswal* Prof. D. M. Dakhne** Abstract: Current network monitoring systems rely strongly on signature-based and supervised-learning-based
Introduction to Data Mining
Introduction to Data Mining 1 Why Data Mining? Explosive Growth of Data Data collection and data availability Automated data collection tools, Internet, smartphones, Major sources of abundant data Business:
A Frequency-Based Approach to Intrusion Detection
A Frequency-Based Approach to Intrusion Detection Mian Zhou and Sheau-Dong Lang School of Electrical Engineering & Computer Science and National Center for Forensic Science, University of Central Florida,
Intrusion Detection System for Cloud Network Using FC-ANN Algorithm
Intrusion Detection System for Cloud Network Using FC-ANN Algorithm Swati Ramteke 1, Rajesh Dongare 2, Komal Ramteke 3 Student, Department of Information Technology, VIIT, Pune, India 1 Student, Department
A Review on Hybrid Intrusion Detection System using TAN & SVM
A Review on Hybrid Intrusion Detection System using TAN & SVM Sumalatha Potteti 1, Namita Parati 2 1 Assistant Professor, Department of CSE,BRECW,Hyderabad,India 2 Assistant Professor, Department of CSE,BRECW,Hyderabad,India
On Entropy in Network Traffic Anomaly Detection
On Entropy in Network Traffic Anomaly Detection Jayro Santiago-Paz, Deni Torres-Roman. Cinvestav, Campus Guadalajara, Mexico November 2015 Jayro Santiago-Paz, Deni Torres-Roman. 1/19 On Entropy in Network
Analyzing TCP Traffic Patterns Using Self Organizing Maps
Analyzing TCP Traffic Patterns Using Self Organizing Maps Stefano Zanero D.E.I.-Politecnico di Milano, via Ponzio 34/5-20133 Milano Italy [email protected] Abstract. The continuous evolution of the
An Analysis on Density Based Clustering of Multi Dimensional Spatial Data
An Analysis on Density Based Clustering of Multi Dimensional Spatial Data K. Mumtaz 1 Assistant Professor, Department of MCA Vivekanandha Institute of Information and Management Studies, Tiruchengode,
Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12
Intrusion Detection Systems and Supporting Tools Ian Welch NWEN 405 Week 12 IDS CONCEPTS Firewalls. Intrusion detection systems. Anderson publishes paper outlining security problems 1972 DNS created 1984
AUTO CLAIM FRAUD DETECTION USING MULTI CLASSIFIER SYSTEM
AUTO CLAIM FRAUD DETECTION USING MULTI CLASSIFIER SYSTEM ABSTRACT Luis Alexandre Rodrigues and Nizam Omar Department of Electrical Engineering, Mackenzie Presbiterian University, Brazil, São Paulo [email protected],[email protected]
NEURAL NETWORKS IN DATA MINING
NEURAL NETWORKS IN DATA MINING 1 DR. YASHPAL SINGH, 2 ALOK SINGH CHAUHAN 1 Reader, Bundelkhand Institute of Engineering & Technology, Jhansi, India 2 Lecturer, United Institute of Management, Allahabad,
OUTLIER ANALYSIS. Data Mining 1
OUTLIER ANALYSIS Data Mining 1 What Are Outliers? Outlier: A data object that deviates significantly from the normal objects as if it were generated by a different mechanism Ex.: Unusual credit card purchase,
SURVEY OF INTRUSION DETECTION SYSTEM
SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT
Two State Intrusion Detection System Against DDos Attack in Wireless Network
Two State Intrusion Detection System Against DDos Attack in Wireless Network 1 Pintu Vasani, 2 Parikh Dhaval 1 M.E Student, 2 Head of Department (LDCE-CSE) L.D. College of Engineering, Ahmedabad, India.
Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management
Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management Paper Jean-Louis Amat Abstract One of the main issues of operators
Network Intrusion Detection Using a HNB Binary Classifier
2015 17th UKSIM-AMSS International Conference on Modelling and Simulation Network Intrusion Detection Using a HNB Binary Classifier Levent Koc and Alan D. Carswell Center for Security Studies, University
Index Terms: Intrusion Detection System (IDS), Training, Neural Network, anomaly detection, misuse detection.
Survey: Learning Techniques for Intrusion Detection System (IDS) Roshani Gaidhane, Student*, Prof. C. Vaidya, Dr. M. Raghuwanshi RGCER, Computer Science and Engineering Department, RTMNU University Nagpur,
How To Detect Denial Of Service Attack On A Network With A Network Traffic Characterization Scheme
Efficient Detection for DOS Attacks by Multivariate Correlation Analysis and Trace Back Method for Prevention Thivya. T 1, Karthika.M 2 Student, Department of computer science and engineering, Dhanalakshmi
Detection of Distributed Denial of Service Attacks Using Statistical Pre-Processor and Unsupervised Neural Networks
Detection of Distributed Denial of Service Attacks Using Statistical Pre-Processor and Unsupervised Neural Networks Rasool Jalili 1, Fatemeh Imani-Mehr 1, Morteza Amini 1, Hamid Reza Shahriari 1 Department
REVIEW OF HEART DISEASE PREDICTION SYSTEM USING DATA MINING AND HYBRID INTELLIGENT TECHNIQUES
REVIEW OF HEART DISEASE PREDICTION SYSTEM USING DATA MINING AND HYBRID INTELLIGENT TECHNIQUES R. Chitra 1 and V. Seenivasagam 2 1 Department of Computer Science and Engineering, Noorul Islam Centre for
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Mukta Garg Assistant Professor, Advanced Educational Institutions, Palwal Abstract Today s society
How To Use Neural Networks In Data Mining
International Journal of Electronics and Computer Science Engineering 1449 Available Online at www.ijecse.org ISSN- 2277-1956 Neural Networks in Data Mining Priyanka Gaur Department of Information and
Data Clustering for Anomaly Detection in Network Intrusion Detection
Data Clustering for Anomaly Detection in Network Intrusion Detection Jose F. Nieves Polytechnic University of Puerto Rico Research Alliance in Math and Science Dr. Yu (Cathy) Jiao Applied Software Engineering
Software Defect Prediction for Quality Improvement Using Hybrid Approach
Software Defect Prediction for Quality Improvement Using Hybrid Approach 1 Pooja Paramshetti, 2 D. A. Phalke D.Y. Patil College of Engineering, Akurdi, Pune. Savitribai Phule Pune University ABSTRACT In
Network Machine Learning Research Group. Intended status: Informational October 19, 2015 Expires: April 21, 2016
Network Machine Learning Research Group S. Jiang Internet-Draft Huawei Technologies Co., Ltd Intended status: Informational October 19, 2015 Expires: April 21, 2016 Abstract Network Machine Learning draft-jiang-nmlrg-network-machine-learning-00
A Review on Network Intrusion Detection System Using Open Source Snort
, pp.61-70 http://dx.doi.org/10.14257/ijdta.2016.9.4.05 A Review on Network Intrusion Detection System Using Open Source Snort Sakshi Sharma and Manish Dixit Department of CSE& IT MITS Gwalior, India [email protected],
HIDS and NIDS Hybrid Intrusion Detection System Model Design Zhenqi Wang 1, a, Dankai Zhang 1,b
Advanced Engineering Forum Online: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 991-994 doi:10.4028/www.scientific.net/aef.6-7.991 2012 Trans Tech Publications, Switzerland HIDS and NIDS Hybrid Intrusion
Data Mining for Customer Service Support. Senioritis Seminar Presentation Megan Boice Jay Carter Nick Linke KC Tobin
Data Mining for Customer Service Support Senioritis Seminar Presentation Megan Boice Jay Carter Nick Linke KC Tobin Traditional Hotline Services Problem Traditional Customer Service Support (manufacturing)
