Research Article | Open Access | Download PDF
Volume 3 | Issue 3 | Year 2012 | Article Id. IJCTT-V3I3P119 | DOI : https://doi.org/10.14445/22312803/IJCTT-V3I3P119
A Novel Datamining Based Approach for Remote Intrusion Detection
Renu Deepti.S, Loshma.G
Citation :
Renu Deepti.S, Loshma.G, "A Novel Datamining Based Approach for Remote Intrusion Detection," International Journal of Computer Trends and Technology (IJCTT), vol. 3, no. 3, pp. 430-435, 2012. Crossref, https://doi.org/10.14445/22312803/IJCTT-V3I3P119
Abstract
Today, as information systems are more open to the Internet,attacks and intrusions are also increasing rapidly so the importance of secure networks is also vital. New intelligent Intrusion Detection Systems which are based on sophisticated algorithms are in demand.Intrusion Detection System (IDS) is an important detection used as a countermeasure to preserve data integrity and system availability from attacks. It is a combination of software and hardware that attempts to perform intrusion detection.In data mining based intrusion detection system, we should make use of particular domain knowledge in relation to intrusion detection in order to efficiently extract relative rules from large amounts of records.This paper proposes boosting method for intrusion detection and it is possible to detect the intrusions in all the Systems, without installing the Software in client System (like client-server) via Web service (Apache tomcat) by using the ip address of the client system.
Keywords
Boosting, data mining, anomaly detection, network intrusion detection system.
References
[1] Daniel Barbara, Ningning Wu and Sushil Jajodia Detecting novel network intrusion using bayes estimators. In Proceedings of First SIAM Conference on data mining Chicago, 2001.
[2] Eric Bloedorn, Alan D. Christiansen, William Hill, Clement Skorupka, Lisa M. Talbot, and Jonathan Tivel. Data mining for network intrusion detection: How to get started.
[3] E Knorr, Ng, R.: Algorithms for Mining Distance-based Outliers in Large Data Sets. Proceedings of the VLDB Conference (1998)
[4] H. Wang, W. Fan, P. Yu, J. Han, “Mining concept-drifting data streamsusing ensemble classifiers”, InProceedings of the ACM SIGKDD, pp. 226-235, Washington DC, 2003.
[5] M. Masud, J. Gao, L. Khan, J. Han, “Classifying evolving data streamsfor intrusion detection”.
[6] M. Panda, M. Patra, “Ensemble rule based classifiers for detecting network intrusions”, pp 19-22, 2009
[7] R. Bane, N. Shivsharan, “Network intrusion detection system (NIDS)”pp. 1272-1277, 2008.
[8] R. P. Lippmann, D. J. Fried, I. Graf, J. W. Haines, K. P. Kendall, D. McClung, D. Weber, S. E. Webster, D. Wyschogrod, R. K. Cunningham, M. A. Zissman, “Evaluating Intrusion Detection Systems: The 1998 DARPA Off-line Intrusion Detection Evaluation. Proceedings DARPA Information Survivability Conference and Exposition (DISCEX) 2000”, Vol 2, pp. 12--26, IEEE Computer Society Press, Los Alamitos, CA, 2000
[9] S. Ramaswami, R. Rastogi, K.Shim, “Efficient Algorithms for MiningOutliers from Large Data Sets”, Proceedings of the ACM SIGMOD Conference, 2000.
[10] S. T. Brugger, “Data mining methods for network intrusion detection”,pp. 1-65, 2004.
[11] S. Ramaswami, R. Rastogi, K.Shim, “Efficient Algorithms for MiningOutliers from Large Data Sets”, Proceedings of the ACM SIGMOD Conference, 2000.
[12] V. Barnett and T. Lewis. Outliers in Statistical Data. John Wiley and Sons, New York, 1994.
[13] W. Lee, S. J. Stolfo, “Data Mining Approaches for Intrusion Detection”, Proceedings of the 1998 USENIX Security Symposium, 1998.
[14] W. Lee, S. J. Stolfo, K. W. Mok, “A data mining framework for buildingintrusion detection models”, Proc. of the 1999 IEEE Symp.on Securityand Privacy, pp. 120--132. Oakland, CA, 1999.
[15] Yoav Freund and Robert E. Schapire. Experiments with a new boosting algorithm. In ICML, pages 148–156, 1996.
[16] Z. Yu, J. Chen, T. Q. Zhu, “A novel adaptive intrusion detection systembased on data mining”, pp.2390-2395, 2005