Comparative Analysis of Intrusion Detection System with Mining
(*) Corresponding author
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)
Intrusion Detection System (IDS) is a system that monitors the network activities for a suspicious event. Suspiciousness in the event cannot be identified by a single activity. Set of activities that crosses the limit of normal behavior is considered as an intrusion. There are many methods that provide security like authorization, authentication, and encryption. But all these methods decide the security issue by a single activity so that the slow intrusion is not identified. In this paper, we review the existing real time IDS models that capture the slow poisoning of the network by using improved data mining algorithms. Normal IDS has the issues like low accuracy, high false negative rates. This system suggests the high accuracy IDS system with less false positives.
Copyright © 2013 Praise Worthy Prize - All rights reserved.
Emmanuel S. Pillai, R.C. Joshi, Rajdeep Niyogi, Network forensic frameworks: survey and research challenges, Digital Ivestigation, vol. 7, pp. 14-27, 2010.
D.Barbara, S.Jajodia, Applications of Data Mining in Computer Security (Norwell, MA:Kluwer,2002).
A. Sundaram, An Introduction to intrusion detection (Crossroads: The ACM Student Magazine, 2(4), 1996).
K. Anand, S. Ganapathy, K.Kulothungan, P. Yogesh, A. Kannan, A rule based approach for Attribute Selection and Intrusion Detection in Wireless Sensor Networks, In proceedings of International Conference on Modeling Optimisation and Computing., pp. 1658-1664, 2012.
Marcos M. Campos, Boriana L. Milenova, Creation and Deployment of Data Mining-Based Intrusion Detection Systems in Oracle Database 10g, In Proceedings of the Fourth International Conference on Machine Learning and Applications, 2005.
W. Lee, S. Stolfo, and K. Mok, A Data Mining Framework for Building Intrusion Detection Model, In Proceedings of the IEEE Symposium on Security and Priva 1cy, Oakland, CA, pp. 120-132, 1999.
E. Eskin, A. Arnold, M .Prerau, L. Portnoy, and S. Stolfo, A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data, In Applications of Data mining in Computer Security. Norwell, MA: Kluwer, 2002.
Srilatha Chebrolu, Ajith Abraham, Johnson P. Thomas, Feature deduction and ensemble design of intrusion detection systems, Computers and Security. pp. 295-307, 2005.
R. Agrawal, T. Imielinski, and A. Swami, Mining association rules between sets of items in large databases, Proc. 1993 ACM SIGMOD International Conf. on Management of Data, Washingtion, DC, 1993, 207-216.
W. Lee and S. Stolfo, Data mining approaches for intrusion detection, Proc. 7th USENIX Security Symposium (SECURITY ’98), San Antonio, TX, 1998, 79-94.
M .Moorthy, S. Sathiyabama, A Hybrid Data Mining based Intrusion Detection System for Wireless Local Area Networks, In proceedings of International Journal of Computer Applications, vol.49, pp. 10, July 2012.
Ian H. Witten & Eibe Frank , Data Mining-Practical Machine Learning Tools and Techniques (Morgan Kaufmann publishers, 2005).
Jiawei Han, Micheline Kamber, Jain Pei, Data Mining : Concepts and Techniques ( Elsevier, 2011)
Nsl-kdd data set for network-based intrusion detection systems, Available on: http://nsl.cs.unb.ca/KDD/NSL-KDD.html, March 2009.
S. Vinila Jinny, J.Jaya Kumari, Neuralised intrusion detection system, In proceedings of IEEE Conference on Signal Processing, Communication, Computing and Networking Technologies, 2011.
Weihua, H., Qi, J., Yuge, D., Li, C., Zhao, W., Li, C., Anides: Agent-based network intrusion detection expert system, (2012) International Review on Computers and Software (IRECOS), 7 (4), pp. 1453-1457.
- There are currently no refbacks.
Please send any question about this web site to email@example.com
Copyright © 2005-2023 Praise Worthy Prize