CFP last date
20 January 2025
Reseach Article

Intrusion Detection through Ensemble Classification Approach

Published on November 2011 by Priyanka J. Pathak, Snehlata S. Dongre
2nd National Conference on Information and Communication Technology
Foundation of Computer Science USA
NCICT - Number 1
November 2011
Authors: Priyanka J. Pathak, Snehlata S. Dongre
d32ed5c4-3a2c-4951-a521-92a7c86e5d49

Priyanka J. Pathak, Snehlata S. Dongre . Intrusion Detection through Ensemble Classification Approach. 2nd National Conference on Information and Communication Technology. NCICT, 1 (November 2011), 11-15.

@article{
author = { Priyanka J. Pathak, Snehlata S. Dongre },
title = { Intrusion Detection through Ensemble Classification Approach },
journal = { 2nd National Conference on Information and Communication Technology },
issue_date = { November 2011 },
volume = { NCICT },
number = { 1 },
month = { November },
year = { 2011 },
issn = 0975-8887,
pages = { 11-15 },
numpages = 5,
url = { /proceedings/ncict/number1/4198-ncict003/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 2nd National Conference on Information and Communication Technology
%A Priyanka J. Pathak
%A Snehlata S. Dongre
%T Intrusion Detection through Ensemble Classification Approach
%J 2nd National Conference on Information and Communication Technology
%@ 0975-8887
%V NCICT
%N 1
%P 11-15
%D 2011
%I International Journal of Computer Applications
Abstract

Security is a big issue for all networks in today’s enterprise environment. Hackers and intruders have made many successful attempts to bring down high profile company networks and web services. Intrusion Detection System (IDS) is an important detection that is used as a countermeasure to preserve data integrity and system availability from attacks. The main reason for using data mining classification methods for Intrusion Detection System is due to the enormous volume of existing and newly appearing network data that require processing. Data mining is the best option for handling such type of data. This paper presents the new idea of applying data mining classification techniques to intrusion detection systems to maximize the effectiveness in identifying attacks, thereby helping the users to construct more secure information systems. This paper uses ensemble approach with K nearest neighbors and Decision trees for intrusion detection. The ensemble method is advantageous over single classifier. In this novel class can be detected for attack is reported to user in case of attack detection.An Intrusion detection system (IDS) is a security system that monitors computer systems and network traffic and analyzes that traffic for possible hostile attacks originating from outside the organization and also for system misuse or attacks originating from inside the organization. An Intrusion Detection System has a database of attack signatures. The attack signatures are patterns of different types of previously detected attacks. In case it finds a match, the system reports the malicious activity to the management console.

References
  1. Kapil K. Wankhade, Snehlata S. Dongre, Prakash S. Prasad, Mrudula M. Gudadhe, Kalpana A. Mankar,” Intrusion Detection System Using New Ensemble Boosting Approach” 2011 3rd International Conference on Computer Modeling and Simulation (ICCMS 2011)
  2. Kapil K. Wankhade, Snehlata S. Dongre, Kalpana A. Mankar, Prashant K. Adakane,” A New Adaptive Ensemble Boosting Classifier for Concept Drifting Stream Data” 2011 3rd International Conference on Computer Modeling and Simulation (ICCMS 2011)
  3. Hongbo Zhu, Yaqiang Wang, Zhonghua Yu “Clustering of Evolving Data Stream with Multiple Adaptive Sliding Window” 2010 International Conference on Data Storage and Data Engineering.
  4. T.Jyothirmayi, Suresh Reddy,” An Algorithm for Better Decision Tree” T.Jyothirmayi et. al. / (IJCSE) International Journal on Computer Science and Engineering ,Vol. 02, No. 09, 2010, 2827-2830
  5. Peng Zhang, Xingquan Zhu, Jianlong Tan, Li Guo “Classifier and Cluster Ensembles for Mining Concept Drifting Data Streams” 2010 IEEE International Conference on Data Mining
  6. Yongjin Liu , NaLi, Leina Shi, Fangping Li “An Intrusion Detection Method Based on Decision Tree” 2010 International Conference on E-Health Networking, Digital Ecosystems and Technologies
  7. LID Li-xiong, KANGJing, GUO Yun-fei, HUANGHai “A Three-Step Clustering Algorithm over an Evolving Data Stream” The National High Technology Research and Development Program("863" Program) of China, Fund 2008 AAOII002 sponsors.
  8. Mrutyunjaya Panda, Manas Ranjan Patra “A COMPARATIVE STUDY OF DATA MINING ALGORITHMS FOR NETWORK INTRUSION DETECTION” 2008 First International Conference on Emerging Trends in Engineering and Technology
  9. Shuang Wu, Chunyu Yang and Jie Zhou “Clustering-training for Data Stream Mining” Sixth IEEE International Conference on Data Mining - Workshops (ICDMW'06)
  10. Sang-Hyun Oh1, Jin-Suk Kang2, Yung-Cheol Byun3, Gyung-Leen Park3 and Sang-Yong Byun3 “Intrusion Detection based on Clustering a Data Stream” Third ACIS Int'l Conference on Software Engineering Research, Management and Applications (SERA’05).
  11. YI-HONG LU1, YAN HUANG2 “MINING DATA STREAMS USING CLUSTERING” Proceedings of the Fourth International Conference on Machine Learning and Cybernetics, Guangzhou, 18-21 August 2005.
Index Terms

Computer Science
Information Sciences

Keywords

Data mining ensemble approach K-nearest neighbors K-means algorithm Decision Trees security IDS