CFP last date
20 December 2024
Reseach Article

Comparison of Data Mining Techniques for Building Network Intrusion Detection Models

by Harsha Kosta, Darshan Bhavesh Mehta
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 142 - Number 6
Year of Publication: 2016
Authors: Harsha Kosta, Darshan Bhavesh Mehta
10.5120/ijca2016909840

Harsha Kosta, Darshan Bhavesh Mehta . Comparison of Data Mining Techniques for Building Network Intrusion Detection Models. International Journal of Computer Applications. 142, 6 ( May 2016), 31-34. DOI=10.5120/ijca2016909840

@article{ 10.5120/ijca2016909840,
author = { Harsha Kosta, Darshan Bhavesh Mehta },
title = { Comparison of Data Mining Techniques for Building Network Intrusion Detection Models },
journal = { International Journal of Computer Applications },
issue_date = { May 2016 },
volume = { 142 },
number = { 6 },
month = { May },
year = { 2016 },
issn = { 0975-8887 },
pages = { 31-34 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume142/number6/24903-2016909840/ },
doi = { 10.5120/ijca2016909840 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:44:16.199909+05:30
%A Harsha Kosta
%A Darshan Bhavesh Mehta
%T Comparison of Data Mining Techniques for Building Network Intrusion Detection Models
%J International Journal of Computer Applications
%@ 0975-8887
%V 142
%N 6
%P 31-34
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Intrusion detection is a detection of encroachment on the personal network or the private network to breach the security systems. This system provides analytical measures to gather information from various networks or computers to identify the cracks in the security systems caused by intruders. The sudden tremendous growth in the amount of internet users network intrusion detection has gained a huge amount of attention/need towards the research of network. Today, cyber-attacks have become a vital issue for any organization or individual in the network against preserving significant data and information in their personal computers connected to a network. In this paper, a comparative study was done on two different data mining techniques: decision tree and support vector machine algorithms. These techniques are implemented on the dataset for the experiment, since decision tree C5.0 technique and support vector machine (SVM) in general widely used in intrusion experiment data i.e. KDD CUP99 data set downloaded from UCI repository site. The better performance of C5.0 algorithm in terms of accuracy, sensitivity and specificity error measures are to be proved in this paper.

References
  1. Arun K. Pujari,” Data Mining Techniques”, 4th Edition, Universities Press (India) Private Limited.
  2. Gang Wang Jinxing Hao,Jian Ma,Lihua Huang,”A New Approach To Intrusion Detection Using Artificial Neural Networks And Fuzzy Clustering”, Expert System With Application,2010.
  3. Krzysztof J. Cios,” Data Mining Methods For Knowledge Discovery”, Kluwer Academic Publishers, 1998.
  4. Levent Koc,Thomas A. Mazzuchi Shahram Sarkani,”A Network Intrusion Detection System Based On A Hidden Naïve Bayes Multiclass Classifier”, Expert System With Application,2012.
  5. Lihang Yang Ni Yu,” Intrusion Detection Technology Research Based On Apriori Algorithm”, Physics Procedia,2012.
  6. Mahbod Tavallaee, Ebrahim Bagheri, Wei Lu, And Ali A. Ghorbani, “A Detailed Analysis Of The Kdd Cup 99 Data Set” Proceeding Of The 2009 Ieee Symposium On Computational Intelligence In Security And Defence Application.
  7. Mohaned M. Abd-Eldayem,”A Proposed Http Service Based Ids”, Agyption Informatics Journal,2014.
  8. Mrutyunjaya Panda,Ajith Abraham,Manas Ranjan Patra,”A Hybrid Intelligent Approach For Network Intrusion Detection”, Procedia Engineering,2012.
  9. Nsl Kdd Dataset Url Www.Nsl.Cs.Und.Ca/Nsl-Kdd/Kddtrain+-20persent. Txt Last Accessed On March,2014.
  10. Saurabh Mukherjee,Neelam Sharma, ”Intrusion Detection Using Naïve Bayes Classifier With Feature Reduction”,Procedia Technology,2012.
  11. Shi Jnn Horng,”Aa Novel Intrusion Detection System Based On Hierarchical Clustering And Support Vector Machines” 2010
  12. Shin Wei Lin,Kuo Ching Ying,Chou Yuan Lee,Zne Jung Lee,”An Intelligent Algorithm With Feature Selection And Decision Rules Applied To Anomaly Intrusion Detection”,Applied Soft Computing,2012.
  13. Siva S. Sivatha Sindhu,S. Geetha,A. Kannan,”Decision Tree Based Light Weight Intrusion Detection Using A Wrapper Approach”,Expert System With Applications,2012.
  14. Srilatha Chebrolu,Ajith Abraham,Johnson P.Thomas,”Feature Deduction And Ensemble Design Of Intrusion Detection System”, Computers & Security,2004.
  15. SPSS Clementine help file http//www.spss.com last accessed on June 2014.
  16. V. Bolón-Canedo,” Feature Selection and Classification in Multiple Class Datasets: An Application to Kdd Cup 99 Dataset”, Expert Systems with Applications, 2011.
  17. Wenying Feng,Qinglei Zhang,Gongzhu Hu,Jimmy Xiangji,Hwang,”Mining Network Data For Intrusion Through Combining Svms With Ant Colony Networks”, Future Generation Computer Systems,2013
  18. Zonghua Zhang,Hongs Hen, “Application Of Online Training Svms For Real Time Intrusion Detection With Different Considerations”,2005.
  19. Zubair A. Baig,Sadiq M. Sait,Abdul Rahman Shaheen,”Gmdh Based Networks For Intelligent Intrusion Detection”, Engineering Application Of Artificial Intelligence,2013.
Index Terms

Computer Science
Information Sciences

Keywords

Support Vector Machine (SVM) Decision Tree Technique NSL-KDD Data.