Kernel Based Intrusion Detection Using Data Mining Techniques

Authors

  • Shivalingari Bhanu Sree  PG Scholar, Department of IT, VNR Vignan Jyothi Institute of Engineering and Technology, Hyderabad , TS, India

Keywords:

Intrusion Detection, Anomaly Detection, Misuse Detection, KDD Cup99

Abstract

From the onset of internet arrangement, protection menaces normally recognized as intrusions has return to be a highly important and demanding issue in internet arrangements, knowledge and information system. In this system to overcome these menaces every time a detection arrangement was requested because of extreme development in networks. within the growth of the arrangement, attackers came to be stronger and every single amount compromises the protection of the network.Hence a requirement of the Intrusion Detection arrangement came to be a very important and important instrument in net security. Detection and hindrance of such aggressions loud intrusions typically depends on the talent and potency of Intrusion Detection Arrangement (IDS). In this apporch number of component has been directed for using the methods, these systems have their own advantages and deficiencies”. Here mainly focusing on different classification methods.

References

  1. L. Dhanabal, S.P. Shantharajah, "A study of NSL-KDD Dataset for Intrusion Detection System based on Classification Algorithms", International Journal of Advanced Research in Computer and Communication Engineering, Vol.4, Issue 6, pp. (446-452), June 2015.
  2. S. Duque, N.B Omar, "Using data Mining Algorithms for Developing a Model for Intrusion Detection System (IDS)", Proceedings of Science direct: Procedia Computer Science 61, pp. (46-51), 2015.
  3. B. Sharma and H. Gupta, "A design and Implementation of Intrusion Detection System by using Data Mining", IEEE Fourth International Conference on Communication Systems and Network Technologies, pp.700-704, 2015.
  4. U. Ravale, M. marathe, P. Padiya, "Feature Selection based Hybrid Anomoly Intrusion Detection System using K Means and RBF Kernal Function", Proceedings of Science Direct: International Conference on Advanced Computing Technologies and Applications (ICACTA), pp. 428-435, 2015.
  5. W. C. Lin, S. W. Ke, C. F. Tsai, "CANN: An intrusion detection system based on combining cluster centers and nearest neighbors", Proceedings of Science direct: Knowledge-Based Systems, pp. 13-21, 2015.
  6. J. Haque, K.W. Magld, N. Hundewale, "An Intelligent Approach for Intrusion Detection based on Data Mining Techniques", Proceedings of IEEE, 2012.
  7. Liang Hu, Taihui Li, Nannan Xie, Jiejun hu, "False Positive Elemination in Intrusion Detection based on Clustering", IEEE International Conference on Funny System and Knowledge Discovery (FSKD), pp. 519-523, 2015.
  8. Zhengjie Li, Yongzhong Li, Lei Xu, "Anomoly Intrusion Detection Method based on K-Means Clustering Algorithm with Particle Swarm Optimization", IEEE International Conference of Information Technology, Computer Engineering and Management Sciences, pp. 157-161, 2011.
  9. S. J. Horng, M.Y. Su, Y. H. Chen, T. W. Kao, R. J. Chen, J. L. Lai, C. D. Perkasa, "A novel intrusion detection system based on hierarchical clustering and support vector machines", Proceedings of Science direct: Expert Systems with Applications, pp. 306-313, 2011.
  10. Baowei Song Chunxue Wei," Algorithm of Constructing Decision Tree Based on RoughSet Theory, " International Conference on Computer and Communication Technologies Agriculture Engineering, IEEE 2010.
  11. Weiguo Yi, Jing Duan, Mingyu Lu "Optimization of Decision Tree Based on Variable Precision Rough Set" International Conference on Artificial Intelligence and Computational Intelligence IEEE 2010.
  12. V. R. Dinavahi and S. C. Srivastava, "ANN based voltage stability margin prediction," in Proc. IEEE Power Eng. Soc. Summer Meeting, vol. 2, pp. 1275–1280, July 2001.
  13. Chen, F. (2009), "Bayesian Modeling Using the MCMC Procedure," in Proceedings of the SAS Global Forum 2008 Conference,Cary NC: SAS Institute Inc

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
Shivalingari Bhanu Sree, " Kernel Based Intrusion Detection Using Data Mining Techniques, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 1, pp.268-276, January-February-2018.