Open Access Open Access  Restricted Access Subscription or Fee Access

Anomaly Based Intrusion Detection Network System

Rucha Sonawane, Trushali Tajane, Pooja Chavan, Samiksha Mali, Preeti Joshi

Abstract


Network is information system implemented with a collection of interconnected components. Network Security is nothing but any activities designed to protect your network. Intrusion poses a serious security risk in a network environment.  Anomaly based intrusion detection in networks is the problem of finding exceptional patterns in network traffic that do not conform to the expected normal behavior. An intrusion attempt is an unauthorized attempt to access the information or render a system unreliable or unusable.  Therefore, it represents one of the efficient Data Mining algorithm called K-Means clustering and Naive Bayes classification for Anomaly Based Network Intrusion detection. This technique performs better in terms of detection rate.


Keywords


Network Intrusion Detection, Data Mining, K-means Clustering, Naive Bayes Classifier, Detection Rate.

Full Text:

PDF

References


Network Anomaly Detection: Methods,Systems and Tools. Manovar H. Bhuyan,D.K.Bhattacharyya and J.K. Kalita, IEEE vol.16,2014.

Intrusion Detection Using Naive Bayes for Real Time Data. Shubhangi S. Gujar and B.M.Patil P.G.Dept., MBES COE, India. May, 2014.

Tsai, C.F. and Lin, C.Y, 2010. A triangle area based nearest neighbour approach is used for intrusion detection. Pattern Recognition, 43(1): p.222-229.

K-Means Clustering and Naive Bayes classification used for Intrusion Detection. Z.Muda,W.yassin, University of Malaysia, 43400UPM.

Shaohua, T. Hongle, and Jiangyi,S., 2010. A Cooperative Network Intrusion Detection Based on Fuzzy SVMs. Journal of Networks, 5:p.475-483.

An Automated signature creator for a signature based Intrusion Detection System with network attack detection capabilities (PANCAKES).De Ocampo, Frances Bernadette C and Del Castillo,College of Computer studies, Manila,Phillipines.

A Fast Pattern Matching Algorithm for the Network Processor Based Intrusion Detection System. Rong-Tai• Liul , Nen-Fu Huang! , Chia-Nan Kao, Chih-Hao Chen, National Tsing Hua University, Taiwan.

A Genetic Clustering Technique for Anomaly-Based Intrusion Detection Systems byNaila Belhadj Aissa, Mohamed Guerroumi, University of Science and Technology Houari Boumediene,Faculty of Electronic and Computer Science Algiers, Algeria.

Malicious Code Detection Using Naïve Bayes Classifier by Aniket Sagane, Prof. S.S.Dhande. IT, SGBAU, vol.3, April 2014.

Intrusion Detection Using Naive Bayes for Real Time Data. Shubhangi S. and B.M.Patil MBESCOE.

C. Kruegel, D. Mutz, W. Robertson, and F. Valeur, “Bayesian eventclassification based on intrusion detection” in 19th Annual ComputerSecurity Applications Conference, 2003.

L. Khan, M. Awad, and B. Thuraisingham, “The New Intrusion DetectionSystem Using Support Vector Machines and Hierarchical Clustering,” The VLDB Journal, vol. 16, no. 4, pp. 507–521, October 2007.

C. F. Tsai, Y. F. Hsu, C. Y. Lin, and W. Y. Lin, “Intrusion detection by machine learning:The review” Expert Systems with Applications,vol. 36, no. 10, pp. 11 994–12 000, December 2009.

M. Y. Su, G. J. Yu, and C. Y. Lin, “The real-time network intrusiondetection system for large-scale attacks based on the incremental miningapproach,” Computers & Security, vol. 28, no. 5, pp. 301–309, 2009.

P. K. Chan, M. V. Mahoney, and M. H. Arshad, “The machine learningapproach used for anomaly detection” Department of Computer Science,Florida Institute of Technology, Tech. Rep. CS-2003-06, 2003.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.