We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

Application of k-Nearest Neighbour Classification Method for Intrusion Detection in Network Data

by S. Venkata Lakshmi, T. Edwin Prabakaran
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 97 - Number 7
Year of Publication: 2014
Authors: S. Venkata Lakshmi, T. Edwin Prabakaran
10.5120/17021-7306

S. Venkata Lakshmi, T. Edwin Prabakaran . Application of k-Nearest Neighbour Classification Method for Intrusion Detection in Network Data. International Journal of Computer Applications. 97, 7 ( July 2014), 34-37. DOI=10.5120/17021-7306

@article{ 10.5120/17021-7306,
author = { S. Venkata Lakshmi, T. Edwin Prabakaran },
title = { Application of k-Nearest Neighbour Classification Method for Intrusion Detection in Network Data },
journal = { International Journal of Computer Applications },
issue_date = { July 2014 },
volume = { 97 },
number = { 7 },
month = { July },
year = { 2014 },
issn = { 0975-8887 },
pages = { 34-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume97/number7/17021-7306/ },
doi = { 10.5120/17021-7306 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:23:30.692087+05:30
%A S. Venkata Lakshmi
%A T. Edwin Prabakaran
%T Application of k-Nearest Neighbour Classification Method for Intrusion Detection in Network Data
%J International Journal of Computer Applications
%@ 0975-8887
%V 97
%N 7
%P 34-37
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In today's world, increasing number of networks connected to the Internet poses a great challenge on security issues. Many defensive mechanisms exist and one such higher level mechanism is network intrusion detection system. Intrusion detection system is a process of intelligently monitoring the events in an individual system or network, analysing them for signs of violation of security policy. Two major classifications of intrusion detection systems are misuse and anomaly intrusion detection systems. Misuse detection system refers to detection of intrusions that follow well defined intrusion patterns. Anomaly detection model refers to detection performed by detecting changes in the behaviour of the system. Many data mining techniques like k-Nearest Neighbour (kNN), Association Rule Mining etc. , have been applied to intrusion detection. This paper aims at application of kNN to a subset of records from the KDD Cup 1999 dataset for classification of connection records into normal or attacked data. The paper also applies kNN to the subset of records with the selected features proposed by Kok-Chin-Khor et al [5] to compare the classifications.

References
  1. Adebayo O. Adetunmbi*, Samuel O. Falaki, Olumide S. Adewale and Boniface K. Alese, "Network Intrusion Detection based on Rough Set and k-Nearest Neighbour", International Journal of Computing and ICT Research, Vol. 2, No. 1, pp. 60-66. ,2008, http://www. ijcir. org/volume1number2/article7. pdf.
  2. Ganapathy. S, Jaishankar. N, Yogesh. P and Kannan. A, "An Intelligent Intrusion Detection system using Outlier Detection and Multiclass SVM, Int. J. on Recent Trends in Engineering & Technology, Vol. 05,No. 01,166-169, 2011.
  3. Hossein M. Shirazi, "Anomaly Intrusion Detection using Information Theory,k-NN and KMC Algorithms", Australian Journal of Basic and Applied Sciences,3(3):2581-2597,2009.
  4. KDD CUP 1999 DATASET: http://kdd. ics. uci. edu/databases/kddcup99/
  5. Kok-Chin Khor, Choo-Yee Ting and Somnuk-Phon Amnuaisuk, "From Feature Selection to Building of Bayesian Classifiers: A Network Intrusion Detection Perspective", American Journal of Applied Sciences 6(11),1948-1959,2009.
  6. Lee. W, Stolfo. S. J, Mok. K. W, "Algorithms for Mining System Audit Data", of Proc. KDD,1999.
  7. Neveen I. Ghali , "Feature Selection for Effective Anomaly Based Intrusion Detection", International Journal of Computer Science and Network Security, Vol. 9 No. 3 March 2009.
  8. Norbik Bashah, Idris Bharanidharan Shanmugam, Abdul Manan Ahmed, "Hybrid Intelligent Intrusion Detection System", World Academy of Science, Engineering and Technology, pp 23-26,2005.
  9. Stolfo. S. J, Hershkop. S, Wang. K, Nimeskern. O, and Hu. C. W, "Behaviour Profiling of Email", First NSF/NIJ,ISI,2003.
  10. Victor-Valeriu Patriciu, Liviu Rusu, Iustin Priescu, "Data mining approaches for Intrusion Detection in Email system Internet-Based",Military Technical Academy, 144-147,2003.
Index Terms

Computer Science
Information Sciences

Keywords

Attacks connection records normal testing dataset training dataset