Intrusion Detection Algorithm for data security

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2015 by IJCTT Journal
Volume-29 Number-3
Year of Publication : 2015
Authors : Neeraj Kumar, Dr. Upendra Kumar, Dr. G. Sahoo
  10.14445/22312803/IJCTT-V29P127

MLA

Neeraj Kumar, Dr. Upendra Kumar, Dr. G. Sahoo "Intrusion Detection Algorithm for data security". International Journal of Computer Trends and Technology (IJCTT) V29(3):157-160, November 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Rapid development in Network Technologies system in this I.T. era huge flow of data from network every moment, so obviously there should be a strong Network Intrusion Detection system (NIDS)is an important detection system that is used as a counter measure to prevent data integrity and system availability from attack [14] or a robust mechanism require to distinguish between relevant and non-relevant data particularly acting as an attack. Thus to provide total network security from intrusion this paper contributed to propose a innovative Intrusion Detection Algorithm (HDensities of data points known as Hamming density. Hamming density [8] is k-nearest neighbor divided by Hamming-distance) Density based Outlier Detection in data mining on UCI repository KDD Cup’99(Network Intrusion) data set. Simulation and Compare the result in finding the intrusion by our propose DBOD from other exiting algorithms like LOF in own Simulator and found comparatively more accuracy and increase in detecting the number of Intrusion in our proposed work.

References
[1] KDDCup99http://www.ll.mit.edu/IST/ideval/data/data_ind ex.html
[2] L.Portnoy ―Intrusion Detection with unlabeled data using clustering.
[3] P. Manandhar, and Z. Aung ,―Intrusion Detection Based on Outlier Detection Method, ICIDIT‘2014), April 21-22, 2014 Bangkok (Thailand) pp:69-74.
[4] J. Han and M. Kamber, Data Mining, Concepts and Techniques, Morgan Kaufmann, San Francisco, 2001.. [5] V. Chandola, A. Banerjee, and V. Kumar. Anomaly detection: A survey. ACM Comput. Surv., 41(3):1–58.
[6] Frank, A. & Asuncion, A. (2010). UCI Machine Learning Repository [http://archive.ics.uci.edu/ml]. Irvine, CA: University of California,School of Information and Computer Science.
[7] Proceedings of the World Congress on Engineering and Computer Science 2010 Vol I WCECS 2010, October 20- 22, 2010, San Francisco, USA, Analysis of KDD ‘99 Intrusion Detection Dataset for Selection of Relevance Features.
[8] N.Kumar, G.Jha,et al ICRAMSCS2015, ―Density Based Outlier Detection (DBOD) in Data Mining : A Novel Approach.
[9] S. Suthaharan and T. Panchagnula, ―Relevance feature selection with data cleaning for intrusion detection system, in Proc. 2012 IEEE Southeastcon Conference (SECon), 2012, pp. 1-6.
[10] Knorr, E.M., Ng, R. T., Tucakov, V., ―Distance-based outliers: algorithms and applications, The VLDB Journal, 2000, vol. 8, pp. 237–253.
[11] C. Aggarwal, IBM T. J. Watson Research Center, Yorktown Heights, NY, USA.
[12] F. Gharibian and A. A. Ghorbani, ―Comparative study of supervised machine learning techniques for intrusion detection, in Proc. 5th Annual Conference on Communication Networks and Services Research, (CNSR), 2007, pp. 350-358.
[13] I. H. Witten and E. Frank, ―Data Mining Practical Machine Learning Tools and Techniques, Morgan Kalfman, San Francisco, California, USA, 2005.
[14] Nagaraju Devarakonda,S. padmini et al, ―Outlier Detaction as Network Intrusion Detection System Ising Multi Layered Framework, CCSIT 2011, Part I, CCSIT 131,pp,101-111,2011, Springer-Verlag Berlin Heidelberg 2011.
[15] Anny Lai-mei Chiu, Ada Wai-chee Fu: ―Enhancements on Local Outlier Detection, Proceedings of the Seventh International Database Engineering and Applications Symposium (IDEAS‘03).

Keywords
Hamming Distance, Outliers, Outlier Detection.