We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

A Proposed System for Network Intrusion Detection System Using Data Mining

Published on March 2012 by Gidiya Priyanka V., Ushir Kishori N, Mirza Shoeb A, Ikhankar Sagar D, Khivsara Bhavana A
International Conference in Computational Intelligence
Foundation of Computer Science USA
ICCIA - Number 8
March 2012
Authors: Gidiya Priyanka V., Ushir Kishori N, Mirza Shoeb A, Ikhankar Sagar D, Khivsara Bhavana A
0dd00b80-e074-4d85-b354-8b6f4b8f7a96

Gidiya Priyanka V., Ushir Kishori N, Mirza Shoeb A, Ikhankar Sagar D, Khivsara Bhavana A . A Proposed System for Network Intrusion Detection System Using Data Mining. International Conference in Computational Intelligence. ICCIA, 8 (March 2012), 10-15.

@article{
author = { Gidiya Priyanka V., Ushir Kishori N, Mirza Shoeb A, Ikhankar Sagar D, Khivsara Bhavana A },
title = { A Proposed System for Network Intrusion Detection System Using Data Mining },
journal = { International Conference in Computational Intelligence },
issue_date = { March 2012 },
volume = { ICCIA },
number = { 8 },
month = { March },
year = { 2012 },
issn = 0975-8887,
pages = { 10-15 },
numpages = 6,
url = { /proceedings/iccia/number8/5145-1057/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference in Computational Intelligence
%A Gidiya Priyanka V.
%A Ushir Kishori N
%A Mirza Shoeb A
%A Ikhankar Sagar D
%A Khivsara Bhavana A
%T A Proposed System for Network Intrusion Detection System Using Data Mining
%J International Conference in Computational Intelligence
%@ 0975-8887
%V ICCIA
%N 8
%P 10-15
%D 2012
%I International Journal of Computer Applications
Abstract

Many crimes that are committed in the real world also occur on the internet. These include fraud, Embezzlement, harassment, “stealing” of an identity or stalking. Current signature b a s e d s y s t e m s are inadequate t o tackle t h i s menace. Hence new improved and intelligent systems are in greater demand. In this paper, we propose a system for network intrusion detection using data-mining based techniques for intrusion detection. We use decision tree with entropy function and feature extraction. The IDS is designed to provide the basic detection techniques so as to secure the systems present in the networks that are directly or indirectly connected to the Internet .The experimental results show that our approach provides better performance in terms of accuracy and costthan the ‘Knowledge Development and Data mining’ (KDD) ’99 cup challenge

References
  1. Christine Dartigue, Hyun Ik Jang, and Wenjun Zeng “A New Data-Mining Based Approach for Network Intrusion Detection” 2009 IEEE
  2. Gary Stein, Bing Chen, Annie S. Wu, Kien A. Hua. “Decision Tree Classifier For Network Intrusion Detection With GA-based Feature Selection”
  3. Tarek Abbes, Adel Bouhoula, Michaël Rusinowitch “Protocol Analysis in Intrusion Detection Using Decision Tree”, 2004 IEEE.
  4. Mrutyunjaya Panda Manas Ranjan Patra “Ensembling Rule based classifiers for detecting network intrusions.” 2009 IEEE.
  5. D. E. Denning, “An Intrusion Detection Model”, IEEE Trans-actions on Software Engineering, SE-13, pp. 222-232, 1987.
  6. E Knorr, Ng, R.: Algorithms for Mining Distance-based Outliers in Large Data Sets. Proceedings of the VLDB Conference (1998)
  7. W. Lee, S. J. Stolfo, “Data Mining Approaches for Intrusion Detection”, Proceedings of the 1998 USENIX Security Symposium, 1998.
  8. Z. Yu, J. Chen, T. Q. Zhu, “A novel adaptive intrusion detection system based on data mining”, pp.2390-2395, 2005.
  9. . Li Yun; Liu Xue-cheng; Zhu Feng “A new data mining based network Intrusion Detection model” Computer Application and System Modeling (ICCASM), 2010 International Conference , On Pages V10-153 - V10-155 , 2010.
  10. . Gudadhe, M.; Prasad, P.; Wankhade, K., “Application of data mining in intrusion detection” Computer and Communication Technology (ICCCT), 2010 International Conference on , on page(s): 731 – 735, Sept. 2010
  11. R. P. Lippmann, D. J. Fried, I. Graf, J. W. Haines, K. P. Kendall, D. McClung, D. Weber, S. E. Webster, D. Wyschogrod, R. K. Cunningham, M. A. Zissman, “Evaluating Intrusion Detection Systems: The 1998 DARPA Off-line Intrusion Detection Evaluation. Proceedings DARPA Information Survivability Conference and Exposition (DISCEX) 2000”, Vol 2, pp. 12--26, IEEE Computer Society Press, Los Alamitos, CA, 2000.
  12. P. P. Angelov, X. Zhou, “Evloving fuzzy rule based classifiers from data streams”, IEEE Transaction on Fuzzy Systems, Vol 16, No. 6, pp. 14621475, 2008.
Index Terms

Computer Science
Information Sciences

Keywords

Decision Trees Intrusion Detection Data Mining Feature Extraction Entropy function