Open Access Open Access  Restricted Access Subscription or Fee Access

Data Mining in Network Security using Intrusion Detection System

A. Meena, U. Sinthuja

Abstract


This paper presents recent trends and practices in data mining to handle the rising risks and threats in the area of Network security. These applications include code detection by mining binary executable, network intrusion detection by mining network traffic, anomaly detection, cyber security and data stream mining. This paper proposes a supervised Learning based Intrusion Detection System (IDS) to identify the intruders, attackers in a network and covers the most significant advances and emerging research issues in the field of data mining in network security.


Keywords


Learning, Intrusion Detection, Anomaly Detection, Cyber Security, Stream Mining;

Full Text:

PDF

References


M. Schäfer, V. Lenders, and I. Martinovic, “Experimental analysis of attacks on next generation air traffic communication,” in Applied Cryptography and Network Security, 2013, pp. 253–271.

N. Meng, J. Wang, E. Kodama, and T. Takata, “Reducing data leakage possibility resulted from eavesdropping in wireless sensor network,” International Journal of Space-Based and Situated Computing, vol. 3, no. 1, pp. 55–65, 2013.

T. Denning, T. Kohno, and H. M. Levy, “Computer security and the modern home,” Communications of the ACM, vol. 56, no. 1, pp. 94–103, 2013.

T.-H. Lin, C.-Y. Lin, and T. Hwang, “Manin-the-Middle Attack on ‘Quantum Dialogue with Authentication Based on Bell States’,” International Journal of Theoretical Physics, pp. 1–5, 2013.

Z. Tan, P. Nanda, R. P. Liu, A. Jamdagni, and X. He, “A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis,” IEEE Transactions on Parallel and Distributed Systems, vol. 99, no. 1, p. 1, 2013.

Thuraisingham, B., “Web Data Mining Technologies and Their Applications in Business Intelligence and Counterterrorism”, CRC Press, FL, 2003.

Chan, P, et al, “Distributed Data Mining in Credit Card Fraud Detection”, IEEE Intelligent Systems, 14 (6), 1999.

Lazarevic, A., et al., “Data Mining for Computer Security Applications”, Tutorial Proc. IEEE Data Mining Conference, 2003.

G. J. Williams, “Rattle: A data mining GUI for R,” The R Journal, vol. 1, no. 2, pp. 45–55, 2009.

J. Alcalá-Fdez, L. Sánchez, S. García, M. J. del Jesús, S. Ventura, J. M. Garrell, J. Otero, C. Romero, J. Bacardit, and V. M. Rivas, “KEEL: A software tool to assess evolutionary algorithms for data mining problems,” Soft Computing, vol. 13, no. 3, pp. 307–318, 2009.

D. A. A. G. Singh and E. J. Leavline, “IATARPA: Implementation of anonymity threat avoidance routing protocol architecture for MANET,” in Advanced Computing (ICoAC), 2011 Third International Conference on, 2011, pp. 321–326.

L.-H. Gong, Y. Liu, and N.-R. Zhou, “Novel Quantum Virtual Private Network Scheme for PON via Quantum Secure Direct Communication,” International Journal of Theoretical Physics, pp. 1–9, 2013.

James Hoagland, “The Teredo Protocol Tunneling Past Network Security and Other Security Implications - Google Search,” Symantec Advanced Threat Research, United States, 2006.

M. O. Pervaiz, M. Cardei, and J. Wu, “Routing security in ad hoc wireless networks,” in Network Security, Springer, 2010, pp. 117–142.

D. A. A. G. Singh and E. J. Leavline, “Competency-Based Calisthenics of Learning Outcomes for Engineering Education.” International Journal of Education and Learning Vol. 2, No. 1, March, 2013

M. Ghorbanian, B. Shanmugam, G. Narayansamy, and N. B. Idris, “Signature based Hybrid Intrusion Detection System (HIDS) for android devices,” in Business Engineering and Industrial Applications Colloquium (BEIAC), 2013 IEEE, 2013, pp. 827–831.

A. Benham, H. Read, and I. Sutherland, “Network Attack Analysis and the Behaviour Engine,” Int. J. Com. Net. Tech, vol. 1, no. 2, pp. 103–117, 2013.

J. A. Santos, M. G. de Mendoncca, and C. V. Silva, “An exploratory study to investigate the impact of conceptualization in god class detection,” in Proceedings of the 17th International Conference on Evaluation and Assessment in Software Engineering, 2013, pp. 48–59.

A. M. Rajeswari, G. V. Aishwarya, V. A. Nachammai, and C. Deisy, “Temporal outlier detection on quantitative data using unexpectedness measure,” in Intelligent Systems Design and Applications (ISDA), 2012 12th International Conference on, 2012, pp. 420–424.

G. Han, J. Jiang, W. Shen, L. Shu, and J. Rodrigues, “IDSEP: a novel intrusion detection scheme based on energy prediction in cluster-based wireless sensor networks,” IET Information Security, vol. 7, no. 2, pp. 97–105, 2013.

H. Zhao and Y. Shi, “Detecting Covert Channels in Computer Networks Based on Chaos Theory,” 2013.

G.-H. Tu, C. Peng, H. Wang, C.-Y. Li, and S. Lu, “How Voice Calls Affect Data in Operational LTE Networks,” 2013.

B. G. Gohil, R. K. Pathak, and A. A. Patel, “Federated Network Security Administration Framework,” 2013.

C. Thomas and N. Balakrishnan, “Issues and Challenges in Intrusion Detection with Skewed Network Traffic,” 2013.

G. Ruiz Utgés, “Vulnerability assessment of distributed systems,” B.S. thesis, 2013.

E. J. Morgan, M. G. Shean, F. Alizadehshabdiz, and R. K. Jones, Continuous Data Optimization of Moved Access Points in Positioning Systems. 2013.

F. Li, M. Li, R. Lu, H. Wu, M. Claypool, and R. Kinicki, “Tools and techniques for measurement of ieee 802.11 wireless networks,” in Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, 2006 4th International Symposium on, 2006, pp. 1–8.

D. Dasgupta and H. Brian, “Mobile security agents for network traffic analysis,” in DARPA Information Survivability Conference & Exposition II, 2001. DISCEX’01. Proceedings, 2001, vol. 2, pp. 332–340.

P. Li, C. Li, and T. Mohammed, “Building a repository of network traffic captures for information assurance education,” Journal of Computing Sciences in Colleges, vol. 24.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.