CFP last date
20 December 2024
Reseach Article

Network Intrusion Detection using Selected Data Mining Approaches: A Review

by Munawara Saiyara Munia, Samira Samrose, Pranab Dey, Afsana Salauddin Annesha, Syeda Shabnam Hasan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 132 - Number 13
Year of Publication: 2015
Authors: Munawara Saiyara Munia, Samira Samrose, Pranab Dey, Afsana Salauddin Annesha, Syeda Shabnam Hasan
10.5120/ijca2015907572

Munawara Saiyara Munia, Samira Samrose, Pranab Dey, Afsana Salauddin Annesha, Syeda Shabnam Hasan . Network Intrusion Detection using Selected Data Mining Approaches: A Review. International Journal of Computer Applications. 132, 13 ( December 2015), 9-16. DOI=10.5120/ijca2015907572

@article{ 10.5120/ijca2015907572,
author = { Munawara Saiyara Munia, Samira Samrose, Pranab Dey, Afsana Salauddin Annesha, Syeda Shabnam Hasan },
title = { Network Intrusion Detection using Selected Data Mining Approaches: A Review },
journal = { International Journal of Computer Applications },
issue_date = { December 2015 },
volume = { 132 },
number = { 13 },
month = { December },
year = { 2015 },
issn = { 0975-8887 },
pages = { 9-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume132/number13/23652-2015907572/ },
doi = { 10.5120/ijca2015907572 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:29:16.063957+05:30
%A Munawara Saiyara Munia
%A Samira Samrose
%A Pranab Dey
%A Afsana Salauddin Annesha
%A Syeda Shabnam Hasan
%T Network Intrusion Detection using Selected Data Mining Approaches: A Review
%J International Journal of Computer Applications
%@ 0975-8887
%V 132
%N 13
%P 9-16
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Due to the rapid progress in network technologies, easy availability of the internet and lower cost of mobile devices with wireless network connection facility, the number of internet users is increasing at an exponential rate now-a-days, so does the number of intrusion. Despite the implausible advancement in Information Technology, Intrusion Detection has remained as one of the biggest challenges encountered by network security specialists. Data mining can play a vital role in addressing this issue. In this paper, some selected data mining algorithms available for Network Intrusion Detection have been reviewed, such as- Support Vector Machine, K- Nearest Neighbor, Naïve Bayesian Classifier, Decision tree Algorithm (C4.5), Genetic Algorithm, Logistic Regression, Artificial Neural network, K-means clustering, EM algorithm, Fuzzy Logic and Hidden Markov Chain; along with addressing the advantages and disadvantages of each of them.

References
  1. Pohlheim, Hartmut. 30 Oct. 2003. “Genetic and Evolutionary Algorithms: Principles, Methods and Algorithms.” Genetic and Evolutionary Algorithm Toolbox. Hartmut Pohlheim.
  2. Whitley, Darrell. 1994. “A Genetic Algorithm Tutorial.” Statistics and Computing 4: 65-85.
  3. Crosbie, Mark, and Gene Spafford. 1995. “Applying Genetic Programming to Intrusion Detection.” In Proceedings of 1995 AAAI Fall Symposium on Genetic Programming, pp. 1-8. Cambridge, Massachusetts.
  4. J. T. Yao, S. L. Zhao and L. V. Saxton, “A study on Fuzzy Intrusion Detection,” Proceedings of Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security, 2005, pp. 23-30.
  5. Shanmugam, Bharanidharan, and Norbik Bashah Idris. Hybrid intrusion detection systems (HIDS) using Fuzzy logic. INTECH Open Access Publisher, 2011.
  6. Subaira, A. S., and P. Anitha. "Efficient classification mechanism for network intrusion detection system based on data mining techniques: A survey." Intelligent Systems and Control (ISCO), 2014 IEEE 8th International Conference on. IEEE, 2014.
  7. Hassan, Mostaque Md Morshedur. "Network Intrusion Detection System Using Genetic Algorithm and Fuzzy Logic." International Journal of Innovative Research in Computer and Communication Engineering 1, no. 7 (2013).
  8. Thu, 02 May 2013 15:54:11 +0200
  9. Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic CoRR abs/1304.3535 2013Survey on Intrusion Detection System using Support Vector Machine International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 4, Issue 12, December 2014)
  10. Wang, GuiPing, ShuYu Chen, and Jun Liu. "Anomaly-based Intrusion Detection using Multiclass-SVM with Parameters Optimized by PSO." International Journal of Security and Its Applications 9.6 (2015): 227-242.
  11. Patel, Reema, Amit Thakkar, and Amit Ganatra. "A survey and comparative analysis of data mining techniques for network intrusion detection systems." International Journal of Soft Computing and Engineering (IJSCE) ISSN (2012): 2231-2307.
  12. Mukkamala, S., Janoski, G., & Sung, A. (2002, May). Intrusion detection: support vector machines and neural networks. In proceedings of the IEEE International Joint Conference on Neural Networks (ANNIE), St. Louis, MO (pp. 1702-1707).
  13. Mulay, Snehal A., P. R. Devale, and G. V. Garje. "Intrusion Detection System Using Support Vector Machine and Decision Tree." International Journal of Computer Applications IJCA 3, no. 3 (2010): 40-43.
  14. Modelling Intrusion Detection System using Hidden Markov Model: A Review Preeti Saini,Ms. Sunila Godara Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com
  15. Rabiner, Lawrence, and Biing-Hwang Juang. "An introduction to hidden Markov models." ASSP Magazine, IEEE 3.1 (1986): 4-16.
  16. Devarakonda, Nagaraju, et al. "Intrusion Detection System using Bayesian Network and Hidden Markov Model." Procedia Technology 4 (2012): 506-514.
  17. Khosronejad, Mahsa, et al. "Developing a hybrid method of Hidden Markov Models and C5. 0 as a Intrusion Detection System." International Journal of Database Theory and Application 6.5 (2013): 165-174.
  18. Khreich, Wael, Eric Granger, Ali Miri, and Robert Sabourin. "A survey of techniques for incremental learning of HMM parameters." Information Sciences 197 (2012): 105-130.
  19. Hari Om, AritraKundu, “A Hybrid System for Reducing the False Alarm Rate of Anomaly Intrusion Detection System”, 1st Int’l Conf. on Recent Advances in Information Technology RAIT-2012, 978-1-4577-0697-4/12/$26.00 ©2012 IEEE
  20. Shakiba Khademolqorani, Ali Zeinal Hamadani “An Adjusted Decision Support System through Data Mining and Multiple Criteria Decision Making” The 2nd International Conference on Integrated Information Elsevier 2013
  21. Kanungo T., Mount D. M. 2002 An Efficient k-means Clustering Algorithm: Analysis and Implementation, IEEE Transactions on Pattern Analysis and Machine Intelligence Vol: 24 , Issue: 7
  22. Parveen Kumar and Nitin Gupta, “A Hybrid Intrusion Detection System Using Genetic–Neural Network”, International Journal of Engineering Research and application (IJERA) ISSN: 2248-9622 ,National Conference on Advances in Engineering and Technology (2014)
  23. Biermann; Elmarie; Elsabe C.; Lucas V., “A comparison of Intrusion Detection systems”, Elsevier, Computers & Security, Vol. 20, pp. 676, 683, 2001
  24. C. Gates, J. J. McNutt, J. B. Kadane, and M. I. Kellner,"Scan Detection on Very Large Networks Using LogisticRegression Modeling," 11th IEEE Symposium on Computersand Communications,ISCC '06, 2006, pp. 402-408.
  25. http://www.cs.unm.edu/~terran/downloads/classes/cs529-s11/fp_presentations/wadsworth.pdf
  26. https://en.wikipedia.org/wiki/Logistic_regression#Basics
  27. (COPY OF 141) Subaira.A.S, Mrs.Anitha.P, “Efficient Classification Mechanism for Network Intrusion Detection System Based on Data Mining Techniques: a Survey”, 2014 IEEE 8th Proceedings International Conference on Intelligent Systems and Control (ISCO), 978 -1- 4799 - 3837 - 7/14/$31.00© 2014 IEEE
  28. Manish Kumar Nagle, Dr. Setu Kumar Chaturvedi, “Feature Extraction Based Classification Technique for Intrusion Detection System”, International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, Volume 8, Issue 2 (August 2013), PP. 23-38
  29. Ajayi Adebowale, Idowu S.A, Anyaehie Amarachi A. , “Comparative Study of Selected Data Mining Algorithms Used For Intrusion Detection”, International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-3, Issue-3, July 2013
  30. M.A. Maloof, Machine Learning and Data Mining for Computer Security, Springer- Verlag, 2006.
  31. Hind Tribak , Blanca L. Delgado-Marquez, P.Rojas, O.Valenzuela, H. Pomares and I. Rojas, “ Statistical Analysis of Different Artificial Intelligent Techniques applied to Intrusion Detection System”, IEEE, 2012
  32. Dharminder Kumar, Suman, “ Performance Analysis of Various Data Mining Algorithms: A Review”, International Journal of Computer Applications (0975 – 8887) Volume 32– No.6, October 2011
  33. Han J., Kamber M., “Data Mining: Concepts and Techniques, 2nd edition”, Morgan Kaufmann, 2006.
  34. Johan Baltié, DataMining : ID3 et C4.5, Promotion 2002, Spécialisation S.C.I.A. Ecole pour l’informatique et techniques avancées.
  35. Rong Cao,Lizhen Xu,Improved C4.5 Decision tree algorithm for the analysis of sales.Southeast University Nanjing211189,china,2009.
  36. Gaurav L. Agrawal1, Prof. Hitesh Gupta2, Optimization of C4.5 Decision Tree Algorithm for Data Mining Application, IJTAE,ISSN 2250-2459, Volume 3, Issue 3, March 2013
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion Detection Data mining Neural Networks Fuzzy Logic Support Vector Machine Network Security Naïve Bayes classifier Genetic Algorithm K-Nearest Neighbor Logistic Regression K-means clustering The EM algorithm Decision trees C4.5 Hidden Markov Chain.