Implementation of K-Means Clustering for Intrusion Detection

Authors

  • Saba Karim  B.E. Computer Jamia Institute of Engineering and Management Studies, Akkalkuwa, Maharashtra India
  • Rousanuzzaman  B.E. Computer Jamia Institute of Engineering and Management Studies, Akkalkuwa, Maharashtra India
  • Patel Ayaz Yunus  B.E. Computer Jamia Institute of Engineering and Management Studies, Akkalkuwa, Maharashtra India
  • Patha Hamid Khan  B.E. Computer Jamia Institute of Engineering and Management Studies, Akkalkuwa, Maharashtra India
  • Mohammad Asif  B.E. Computer Jamia Institute of Engineering and Management Studies, Akkalkuwa, Maharashtra India

DOI:

https://doi.org//10.32628/CSEIT1952332

Keywords:

Machine Learning, Deep Learning, Cyber Security, Adversarial Learning

Abstract

Machine learning is embraced in an extensive variety of areas where it demonstrates its predominance over customary lead based calculations. These strategies are being coordinated in digital recognition frameworks with the objective of supporting or notwithstanding supplanting the principal level of security experts although the total mechanization of identification and examination is a luring objective, the adequacy of machine learning in digital security must be assessed with the due steadiness. With the improvement of the Internet, digital assaults are changing quickly and the digital security circumstance isn't hopeful. Since information are so critical in ML/DL strategies, we portray a portion of the normally utilized system datasets utilized in ML/DL, examine the difficulties of utilizing ML/DL for digital security and give recommendations to look into bearings. Malware has developed over the previous decades including novel engendering vectors, strong versatility methods and different and progressively propelled assault procedures. The most recent manifestation of malware is the infamous bot malware that furnish the aggressor with the capacity to remotely control traded off machines therefore making them a piece of systems of bargained machines otherwise called botnets. Bot malware depend on the Internet for proliferation, speaking with the remote assailant and executing assorted noxious exercises. As system movement, action is one of the principle characteristics of malware and botnet task, activity investigation is frequently observed as one of the key methods for recognizing traded off machines inside the system. We present an examination, routed to security experts, of machine learning methods connected to the recognition of interruption, malware, and spam.

References

  1. S. Aftergood, ``Cybersecurity: The cold war online,'' Nature, vol. 547,no. 7661, pp. 30_31, Jul. 2017.
  2. M. I. Jordan and T. M. Mitchell, “Machine learning: Trends, perspectives, and prospects,” Science, 2015.
  3. A. Buczak and E. Guven, “A survey of data mining and machine learning methods for cyber security intrusion detection,” IEEE Communications Surveys & Tutorials, 2015.
  4. E. Blanzieri and A. Bryl, “A survey of learning-based techniques of email spam filtering,” Artificial Intelligence Review, 2008.
  5. J. Gardiner and S. Nagaraja, “On the Security of Machine Learning in Malware C8C Detection,” ACM Computing Surveys, 2016.
  6. DeemanYousifMahmood (Classification Trees with Logistic Regression Functions for Network Based Intrusion Detection System)IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 19, Issue 3, Ver. IV (May - June 2017), PP 48-52.
  7. Battista Biggio, Igino Corona, Blaine Nelson, Benjamin I. P. Rubinstein, DavideMaiorca, Giorgio Fumera, Giorgio Giacinto, and Fabio Roli (Security Evaluation of Support Vector Machines in Adversarial Environments) Submitted on 30 Jan 2014.
  8. Jiong Zhang and Mohammad Zulkernine (Network Intrusion Detection using Random Forests) 2006 IEEE International Conference on Communications.
  9. Yihua Liao, V. RaoVemuri (Using Text Categorization Techniques for Intrusion Detection) 2002 Article. Bibliometrics Data Bibliometrics. · Citation Count: 38 · Downloads (cumulative).
  10. Trupti A. Kumbhare Prof. Santosh V. Chobe (An Overview of Association Rule Mining Algorithms)Trupti A. Kumbhare et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (1), 2014, 927-930
  11. On the Effectiveness of Machine and Deep Learning for Cyber Security 2018 10th International Conference on Cyber Conflict CyCon X: Maximising Effects T. Minárik, R. Jakschis, L. Lindström (Eds.) 2018 © NATO CCD COE Publications, Tallinn.
  12. Graphical User Interface for Intrusion Detection in Telecommunications Networks 28 March 2011.
  13. Prakash Ranganathan, Juan Li, Kendall Nygard, “A Multiagent System using Associate Rule Mining (ARM), a collaborative filtering approach”, IEEE 2010, pp- v7 574- 578.
  14. S.Devaraju, S.Ramakrishnan:,”Analysis of Intrusion Detection System Using Various Neural Network classifiers, IEEE 2011.
  15. Y. Li, J. Xia, S. Zhang, J. Yan, X. Ai, K. Dai, “Anefficient intrusion detection system based on support vector machines and gradually feature removal method”, Expert Systems with Applications,2011,39: p. 424 430.
  16. A.M. Chandrasekhar, “Intrusion Detection Technique By Using K-Means, Fuzzy Neural And Svm Classifier “,2013 International Conference on Computer Communication and Informatics (ICCCI - 2013), Jan 04-06, 2013 Coimbatore, India.
  17. Hesham Altwaijry, “Bayesian Based Intrusion Detection System “, Journal of King Saud University–Computer and Information Sciences (2012) 24,1–6.
  18. V. B. Kosamkar and S. S. Chaudhari “Data Mining Algorithms for Intrusion Detection System: An Overview”. IJCA Proceedings on International Conference on Recent Trends in Information Technology and Computer Science 2012 ICRTITCS(3):9-15, February2013.
  19. S. Duque and M. N. B. Omar “Using Data Mining Algorithms for Developing a Model for Intrusion Detection System (IDS)”. Proceedings of Science direct: Procedia Computer Science 61, pp. (46-51), 2015.
  20. D. Ndumiyana, R. Gotora and H. Chikwiriro “Data Mining Techniques in Intrusion Detection: Tightening Network Security”. International Journal of Engineering Research and Technology, Vol. 2 Issue 5, IJERT, May 2013.
  21. M. K. Asif, T.A. Khan, T.A. Taj,U.Naeem and S. Yakoob "Network Intrusion Detection and its Strategic Importance". Business Engineering and Industrial Applications Colloquium (BEIAC), IEEE, 2013.
  22. A. Bohara, U. Thakore and W. H. Sanders "Intrusion Detection in Enterprise Systems by Combining and Clustering Diverse Monitor Data". Department of Computer Science University of Illinois at Urbana-Champaign. Proceeding HotSos ’16 Proceedings of the Symposium and Bootcamp on the Science of Security, Pages 7-16, Pittsburgh, Pennsylvania— April 19 - 21, 2016.
  23. M. Mandanna, L. Kiran and R. P. Madhavi “Implementation of Intrusion Detection Using Genetic K-Means Algorithm in Wireless Sensor Networks".Dept. of CSE BMSCE Bangalore, India, International Journal of Advance Research in Computer Science and Management Studies, Volume 4, Issue 3, March 2016.
  24. J. Jabez and B. Muthukumar “Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection Approach". Sathyabama Unicersity, Sholinganallur, Chennai, International Conference on IntelligentComputing, Communication and Convergence (ICCC-2015), Procedia Computer Science 48:338-346, December 2015.
  25. A. P. Beldar andV. S.Wadne “The Detail Survey of Anomaly/Outlier Detection Methods in Data Mining". International Journal of Multidisciplinary and Current Research, Vol.3, May/June 2015 issue.
  26. P. S. Rath, M. Hohanty, S. Acharya and M. Aich, “Optimization of IDS Algorithms Using Data Mining Technique”, Proceeding of 53rd IRF International Conference, Pune, India,ISBN 978-93-86083-01-2, 2016.
  27. Md.E. Haque and T.M. Alkharobi, “Adaptive Hybrid Model for Network Intrusion Detection and Comparison among Machine Learning Algorithms”, International Journal.
  28. M. Dhakar and A. Tiwari, “A Novel Data Mining based Hybrid Intrusion Detection Framework”, Journal of Information and Computing Science, 2014, Vol-9 No-1 pp. 037-048, ISSN 1746-7659, England, UK..
  29. TR. Patel, A. Thakkar and A. Ganatra, “A Survey and Comparative Analysis of Data Mining Techniques for Network Intrusion Detection Systems”, International Journal of Soft Computing and Engineering (IUSCE), March-2012, Vol-2, Issue-1, ISSN: 2231-2307.
  30. Somani Manish and Roshni Dubey, “Hybrid Intrusion Detection Model Based on Clustering and Association”, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol.3, Issue 3, ISSN (Print): 2320-3765, ISSN(Online):2278-8875 March 2014.
  31. R. Venkatesan, R. Ganesan and A.A.L. Selvakumar, “A Comprehensive Study in Data Mining Frameworks for Intrusion Detection”, International Journal of Advanced Computer Research, December-2012, Volume-2 Number-4 Issue-7, ISSN (print): 2249-7277 ISSN (online): 2277-7970.
  32. Heba F. Eid et al., “Principal Components Analysis and Support Vector Machine based Intrusion Detection System”, 10 th International Conference on Intelligent Systems Design and Applications, (IEEE, 2010).

Downloads

Published

2019-04-30

Issue

Section

Research Articles

How to Cite

[1]
Saba Karim, Rousanuzzaman, Patel Ayaz Yunus, Patha Hamid Khan, Mohammad Asif, " Implementation of K-Means Clustering for Intrusion Detection, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 2, pp.1232-1241, March-April-2019. Available at doi : https://doi.org/10.32628/CSEIT1952332