A Novel Datamining Based Approach for Remote Intrusion Detection
||International Journal of Computer Trends and Technology (IJCTT)||
|© - Issue 2012 by IJCTT Journal|
|Year of Publication : 2012|
|Authors :Renu Deepti.S, Loshma.G|
Renu Deepti.S, Loshma.G "A Novel Datamining Based Approach for Remote Intrusion Detection "International Journal of Computer Trends and Technology (IJCTT),V3(3):1022-1027 Issue 2012 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract: -Today, as information systems are more open to the Internet,attacks and intrusions are also increasing rapidly so the importance of secure networks is also vital. New intelligent Intrusion Detection Systems which are based on sophisticated algorithms are in demand.Intrusion Detection System (IDS) is an important detection used as a countermeasure to preserve data integrity and system availability from attacks. It is a combination of software and hardware that attempts to perform intrusion detection.In data mining based intrusion detection system, we should make use of particular domain knowledge in relation to intrusion detection in order to efficiently extract relative rules from large amounts of records.This paper proposes boosting method for intrusion detection and it is possible to detect the intrusions in all the Systems, without installing the Software in client System (like client-server) via Web service (Apache tomcat) by using the ip address of the client system.
 Daniel Barbara, Ningning Wu and Sushil Jajodia Detecting novel network intrusion using bayes estimators. In Proceedings of First SIAM Conference on data mining Chicago, 2001.
 Eric Bloedorn, Alan D. Christiansen, William Hill, Clement Skorupka, Lisa M. Talbot, and Jonathan Tivel. Data mining for network intrusion detection: How to get started.
 E Knorr, Ng, R.: Algorithms for Mining Distance-based Outliers in Large Data Sets. Proceedings of the VLDB Conference (1998)
 H. Wang, W. Fan, P. Yu, J. Han, “Mining concept-drifting data streamsusing ensemble classifiers”, InProceedings of the ACM SIGKDD, pp. 226-235, Washington DC, 2003.
 M. Masud, J. Gao, L. Khan, J. Han, “Classifying evolving data streamsfor intrusion detection”.
 M. Panda, M. Patra, “Ensemble rule based classifiers for detecting network intrusions”, pp 19-22, 2009
 R. Bane, N. Shivsharan, “Network intrusion detection system (NIDS)”pp. 1272-1277, 2008.
 R. P. Lippmann, D. J. Fried, I. Graf, J. W. Haines, K. P. Kendall, D. McClung, D. Weber, S. E. Webster, D. Wyschogrod, R. K. Cunningham, M. A. Zissman, “Evaluating Intrusion Detection Systems: The 1998 DARPA Off-line Intrusion Detection Evaluation. Proceedings DARPA Information Survivability Conference and Exposition (DISCEX) 2000”, Vol 2, pp. 12--26, IEEE Computer Society Press, Los Alamitos, CA, 2000
 S. Ramaswami, R. Rastogi, K.Shim, “Efficient Algorithms for MiningOutliers from Large Data Sets”, Proceedings of the ACM SIGMOD Conference, 2000.
 S. T. Brugger, “Data mining methods for network intrusion detection”,pp. 1-65, 2004.
Keywords:boosting, data mining, anomaly detection, network intrusion detection system.