Notification: Our email services are now fully restored after a brief, temporary outage caused by a denial-of-service (DoS) attack. If you sent an email on Dec 6 and haven't received a response, please resend your email.
CFP last date
20 December 2024
Reseach Article

Network Intrusion Detection using Clustering: A Data Mining Approach

by S.Sathya Bama, M.S.Irfan Ahmed, A.Saravanan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 30 - Number 4
Year of Publication: 2011
Authors: S.Sathya Bama, M.S.Irfan Ahmed, A.Saravanan
10.5120/3670-5071

S.Sathya Bama, M.S.Irfan Ahmed, A.Saravanan . Network Intrusion Detection using Clustering: A Data Mining Approach. International Journal of Computer Applications. 30, 4 ( September 2011), 14-17. DOI=10.5120/3670-5071

@article{ 10.5120/3670-5071,
author = { S.Sathya Bama, M.S.Irfan Ahmed, A.Saravanan },
title = { Network Intrusion Detection using Clustering: A Data Mining Approach },
journal = { International Journal of Computer Applications },
issue_date = { September 2011 },
volume = { 30 },
number = { 4 },
month = { September },
year = { 2011 },
issn = { 0975-8887 },
pages = { 14-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume30/number4/3670-5071/ },
doi = { 10.5120/3670-5071 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:16:04.072640+05:30
%A S.Sathya Bama
%A M.S.Irfan Ahmed
%A A.Saravanan
%T Network Intrusion Detection using Clustering: A Data Mining Approach
%J International Journal of Computer Applications
%@ 0975-8887
%V 30
%N 4
%P 14-17
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Network intrusion detection system includes identifying a set of spiteful actions that compromises the basic security requirements such as integrity, confidentiality, and availability of information resources. The enormous increase in network attacks has made the data mining based intrusion detection techniques extremely useful in detecting the attacks. This paper describes a system that is able to detect the network intrusion using clustering concept. This unsupervised clustering technique for intrusion detection is used to group behaviors together depending on their similarity and to detect the different behaviors which are then grouped as outliers. Obviously, these outliers are attacks or intrusion attempts. This proposed method which uses data mining technique will reduce the false alarm rate and improves the security.

References
  1. E. Bloedorn, A. D. Christiansen, W. Hill, C. Skorupka, and L. M. Talbot. Data mining for network intrusion detection: How to get started. Technical report, MITRE, 2001.
  2. Buyer's guide for intrusion prevention systems (IPS), June 3, 2004 (http://www.juniper.net/solutions/literatur/buryerguide/ 710005.pdf)
  3. Dunigan and Hinkel, \Intrusion detection and intrusion prevention on a large network, a case study," in Proceedings of the 1st Workshop on Intrusion Detection and Network Monitoring, Apr. 1999.
  4. Goverdhan Singh, Florent Masseglia, et al Data Mining for Intrusion Detection: from Outliers to True Intrusions, published in "The 13th Pacific-Asia conference on Knowledge Discovery and Data Mining (PAKDD-09)(2009) 891-898"
  5. J. Han and M.Kamber, Data Mining: Concepts and Techniques, Morgan Kaufmann Publishers, pp-335-393,2001.
  6. B.Hay, G. Wets and K.Vanhoof, “Clustering Navigation Patterns on a Website using a Sequence Alignment Method”, 2001 Int.Joint Conf.on Artificial Intelligence,2001.
  7. Kazimierz Kowalski and Mohsen Beheshti Improving Security Through Analysis of Log Files Intersections, International Journal of Network Security, Vol.7, No.1, PP.24{30, July 2008
  8. W. Lee, S. J. Stolfo, and P. K.Chan, \Real Time Data Mining-based Intrusion Detection," in Proceedings Second DARPA Information Survivability Conference and Exposition, 2001. (http://citeseer.ist.psu.edu/452795.html)
  9. W. Lee and S. J. Stolfo. Data mining approaches for intrusion detection. In 7th conference on USENIX Security Symposium, 1998.
  10. A. Marascu and F. Masseglia. A multi-resolution approach for atypical behaviour mining. In The 13th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD’09), Bangkok, Thailand, 2009.
  11. T. Morzy, M.Wojcieechowski and M.Zakrzewicz, “Scalable Hierarchical Clustering Method for Sequences of Categorical Values”, Proc.5th Pacific-Asia Conf. Knowledge Mining, Kowloon,HongKong 2001.
  12. H Ravi Sankar, M M Naidu and K Swapna Devi, “An Algorithm for Finding Frequent Itemsets Using Index Key”, Journal of the CSI, Vol.37 No.3,30-34,July-September 2007.
  13. Seung-Joon Oh, Jae-Yearn Kim, “Clustering Categorical Sequences Using a K-Nearest-Neighbor Method” International Journal on Computer Applications, Vol 12 No.3,141-150,Sept 2005.
  14. A. Valdes and K. Skinner. Probabilistic alert correlation In Recent Advances in Intrusion Detection, pages 54–68, 2001.
  15. William Stallings, Cryptography and Network Security, Third Edition.
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion Detection Security Clustering Classification Common Outliers