A Data Mining Framework for Intrusion Detection System(IDS) using Bio-Inspired Algorithms

Authors

  • Qamar Rayees Khan  Baba Ghulam Shah Badshah University, Rajouri (J&K), India
  • Muheet Ahmed Butt  University of Kashmir, Srinagar, (J&K), India

Keywords:

Information System(IS), intrusion, Intrusion Detection Systems (IDS), biological inspired algorithms, Clustering, Mining and Classification.

Abstract

The information that acts a backbone for any organization is being managed by the sophisticated Information system (IS) is continuously under threat by the vurnabilities by the intrusion. There is always a need to have a better and proper security mechanism in place so that the effect of the intruders may be minimum and at the same time the information may not get compromised, This paper focus on the novel way of dealing the various Intrusions and proposed a model for the Intrusion Detection Systems (IDS). The use of biological inspired algorithms is used in the model for the optimization in terms of efficiency and accuracy. The proposed model comprises of three important phases (Clustering, Mining and classification) to deal with the threats that may occur in the information systems.

References

  1. Manish Joshi, “Classification, Clustering and Intrusion Detection System”, International Journal of Engineering Research and Applications (IJERA), pp.961-964, ISSN: 2248-9622 Vol. 2, Issue 2, Mar-Apr 2012.
  2. Khan Qamar Rayees et al, “Integrity Model based Intrusion Detection System: A Practical Approach”, International Journal of Computer Applications, Vol 115, No. 10, April 2015.
  3. Portnoy, L., E. Eskin, and S. J. Stolfo (2001), ”Intrusion detection with unlabeled data using clustering”. In Proc. of ACM CSS Workshop on Data Mining Applied to Security (DMSA-2001), Philadelphia, pp. 5-8.
  4. Eskin, E., A. Arnold, M. Preraua, L. Portnoy, and S. J. Stolfo (2002), ”A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data”. In D. Barbar and S. Jajodia (Eds.), Data Mining for Security Applications. Boston: Kluwer Academic Publishers.
  5. Leung, K. and Leckie, C. (2005), ”Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters”. In Proc. Twenty-Eighth Australasian Computer Science Conference (ACSC2005), Newcastle, Australia, pp. 333-342, 2005.
  6. Chittur, A. (2001),”Model generation for an intrusion detection system using genetic algorithms”. High School Honors Thesis, Ossining High School. In cooperation with Columbia Univ, 2001.
  7. Crosbie, M. and E. H. Spafford (1995), ”Active defense of a computer system using autonomous agents”. Technical Report CSD-TR- 95-008, Purdue Univ., West Lafayette, IN, 15 February 1995.
  8. J. Zhang and M. Zulkernine (2006), ”Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection”. Symposium on Network Security and Information Assurance Proc. of the IEEE International Conference on Communications (ICC), 6 pages, Istanbul, Turkey, June 2006.
  9. Jimmy Shum and Heidar A. Malki (2008), “Network Intrusion Detection System Using Neural Networks”. Fourth International Conference on Natural Computation in IEEE 2008.
  10. Usman Ahmed, Asif Masood (2009), “Host Based Intrusion Detection Using RBF Neural Networks”. In IEEE 2009 International Conference on Emerging Technologies.
  11. S.Devaraju, Dr. S.Ramakrishnan (2011), “Performance analysis of Intrusion Detection System using various Neural Network Classifiers”. In IEEE International Conference on Recent Trends in Information Technology, ICRTIT 2011.
  12. Mohd. Junedul Haque, Khalid.W. Magld, Nisar Hundewale (2012), “An Intelligent Approach for Intrusion Detection Based on Data Mining Techniques”. In IEEE 2012.
  13. Rohit Arora, Suman (2012), “Comparative Analysis of Classification Algorithms on Different Datasets using WEKA” in International Journal of Computer Applications (0975 –8887), Volume 54– No.13, September 2012.
  14. Mrs. Sneha Kumari, Dr. Maneesh Shrivastava (2012), “A Study Paper on IDS Attack Classification Using Various Data Mining Techniques”. In International Journal of Advanced Computer Research, Volume-2 Number-3 Issue-5, September-2012.
  15. Cannady, J., (1998), “Artificial Neural Networks for Misuse Detection,”. Proceedings, National Information Systems Security Conference (NISSC’98), October, Arlington, VA, pp.443-456.
  16. Khan Q R et al, “Improving Information Integrity using Artificial Bee Colony based Intrusion Detection System”, International Journal of Computer Applications, Vol 130, No. 06, November 2015.

Downloads

Published

2016-12-30

Issue

Section

Research Articles

How to Cite

[1]
Qamar Rayees Khan, Muheet Ahmed Butt, " A Data Mining Framework for Intrusion Detection System(IDS) using Bio-Inspired Algorithms , IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 1, Issue 3, pp.90-93, November-December-2016.