COMPARITIVE STUDY OF DATA MINING TECHNIQUES FOR

advertisement
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 4, Issue 4, April 2015
ISSN 2319 - 4847
COMPARITIVE STUDY OF
DATA MINING TECHNIQUES FOR
INTRUSION DETECTION SYSTEM
1.
SuchiKumari ,Vijay Kumar Jha2 , Chandrashekhar Azad3
1
M.Tech Scholar,Dept. of Computer Science Engineering, Birla Institute of Technology, Ranchi, Jharkhand,India
2
Associate Professor, Dept. of Information Technology, Birla Institute of Technology, Mesra, Ranchi, Jharkhand,India
3
Research Scholar,Birla Institute of Technology Mesra, Ranchi, India3
ABSTRACT
Due to growing information technology day by day,security has remained one challenging area of computer and
network.Intrusion detection is the process of analyzing and monitoring the events occurring in network traffic in order to detect
suspicious activity.In present study,we provide detailed information about data mining techniques like
classification,clustering,association rule, Feature selection, prediction and comparative study of all of the major
techniques.This work will also focuson comparative study of all the techniques which comes under classification and
clustering in terms of computation,speed and detection rate. It will also present the best algorithm of Intrusion Detection of
each type.
Keywords:-Data Mining,classification,clustering,association rule
1. INTRODUCTION
Nowadays,our regular life totally depends upon internet.There exist an extensive growth in using internet in social
networking,healthcare,ecommerce,bank transaction,airlines,railways and many other services.So,It is very important to
make internet application secure and private.The security of a computer system is compromised when an intrusion
takes place.Intrusion are any set of actions that threatens the integrity,availability or confidentiality of a network
resource.Intruder may be from outside the network or legitimate user of anetwork.In early days,only static defense
technique such as virtual private network,firewall and data information encryption e.t.c are used for network
security,but they are not enough to secure network completely.So,there is a need of dynamic defense techniques.Various
research has been done to ensure the security of computer network. As a result,Dynamic approach is introduced which
is called Intrusion Detection System(IDS).IDS is the process of identifying and responding the malicious
activity,targeted at computing and network sources[1].
2.INTRUSION DETECTIONSYSTEM
Intrusion detection system acts an important role in detecting malicious activities in computer and network systems.
The following discusses the various terms related to intrusion detection.
A. Intrusion :It is an illegal act of entering , seizing or taking possession of another’s property. It is any set of actions
that threatens the integrity, confidentiality or availability of a network resource.
i) Data integrity: It ensures that the information which is transmitted from the sender to receiver is not modified
during its transmission until it reaches to the intended receiver . It maintains and assures the consistency and accuracy
of the data during its transmission.
ii) Data Confidentiality: The Principle of confidentiality specify that only sender and the intended recipient should be
able to access the content of message.
iii) Data Availability: It states that resources (information) should be available to authorize parties at all time.
iv) Authentication: means the identity of a party is confirmed.
v ) Non-repudiation : means the denial of integrity and authenticity of information is not possible.
B. Intrusion Detection :The process of analyzing and monitoring the events occurring in network traffic in order to
detect suspicious activity is known as Intrusion Detection . It has emerged an important field for network security.
C. Intrusion Detection System :It inspects all inbound and outbound network activity and identifies suspicious pattern
that may indicate a network or system attack from someone attempting to break into or compromise a system . It is a
software that automates the Intrusion detection process.
Volume 4, Issue 4, April 2015
Page 260
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 4, Issue 4, April 2015
ISSN 2319 - 4847
There are basically 3 steps of IDS:
i) Monitoring and analyzing traffic
ii) Identifying Abnormal Activities
iii) Assessing Severity and Raising Alarm
In some cases, the IDS may also respond to anomalous or malicious traffic by taking action such as blocking the user or
source IP Address from accessing the network.
Figure 1Process of Intrusion Detection Systems
3.CLASSIFICATION OF INTRUSION DETECTION SYSTEM
Intrusion detection system can be classified in various ways. This classification is based on data source, behavior,
structure, how the system is protected and how intrusions are detected.
Approach based IDS :Itis mainly classified into Anomaly and Misuse. Anomaly intrusion detection also known as
Behavior based system because itassociates with variations from user behaviour.It builds models of normal network
behaviour (called profiles) , which it uses to detect new patterns that significantly deviate from the profiles. It detects
unwanted traffic that is unknown and able to find new attacks.
The second approach Misuse detection also known as Signature based system becausealarmsare generated based on
particularattack signatures.It searches for patternsof program or user behavior that match known intrusion scenario ,
which are stored as Signatures. Each of these techniques has their strength and weakness.
Protection based IDS : It is classified according to data source from which information is extracted. Host based IDS
depends upon single host or computer system on the network. It is implemented by placing sensor on a particular r
computer system. A HIDS monitors the inbound and outbound packets from the device only and will alert the user or
administrator , if suspicious activity is sensed. On other side Network based IDS examines each and every node on
network under observation. However IDS available in market are hybrid of NIDS and HIDS. Hybrid Intrusion
Detection System is has flexibility and it increases the security level. It combines IDS sensor locations and reports
attacks are aimed at particular segments or entire network.
Architecture Based IDS:IDS can also distributed or centralized. In distributed IDS numbers of IDS are present on the
network where they communicate with each other or to a centrally located sever Whereas IDS can also be a standalone
system.
Volume 4, Issue 4, April 2015
Page 261
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 4, Issue 4, April 2015
ISSN 2319 - 4847
Behavior based IDS: It is either active or passive. Active IDS detects and also prevents intrusion. On opposite side
passive IDS only detect intrusions. Hence active IDS is also known as IDPS.
Figure 2 Architecture of Intrusion Detection System
4. LITERATURE REVIEW
MengJianliang et.al. (2009) had presented the K-means algorithm for intrusion detection. Experimental results on a
subset of KDD-99 dataset showed the stability of efficiency and accuracy of the algorithm. With different setting, the
detection rate stayed always above 96% while the false alarm rate was below 2%.The time complexity is
low.MohammadrezaEktela et.al.(2010), used Support Vector Machine andclassification tree Data mining technique for
intrusiondetection in network. They compared C4.5 and Support Vector Machine by experimental result and found that
C4.5 algorithm has better performance in term of detection rate and false alarm rate than SVM, but for U2R
attackSVM performs better.Song Naiping et.al.(2010),studied on Intrusion detection based on Data mining. Here, types
of IDS means Misuse detection and Anomaly detection are described by the author along with different Data mining
techniques which are used to build IDS.Z. Muda et.al (2011) proposed an IDS which produce low false alarm rate
&Improve accuracy and detection rate and capable to correctly classify Normal data type, and also attack data types like
Probe and DoSbut not capable to correctly classify for U2R and R2L.Ahmed Youssef et.al. (2011) suggested that a
combination of DM and NBA approaches may overcome the limitations in current IDS and leads to high performance
ones.Gholam Reza Zargar, Tania Baghaie,(2012) proposed a category-based selection of effective parameters for
intrusion detection using Principal Components Analysis (PCA).Susheel Kumar Tiwari and Mahendra Singh
Sisodiai(2012) have proposed a model of NIDS based on K-Means Clustering via Naive Bayes algorithm. The model
builds the patterns of the network services over data sets labeled by the services. With the built patterns, the model
detects attacks in the datasets using the k-means clustering via naive Bayes Classifier algorithm. Compared to the
Naive based approach, this approach achieve higher detection rate. However, it generates somewhat more false positive
rate.Nadiammai,et.al.(2013)proposed EDADT algorithm which reducesthe actual size of the dataset and helps the
administratorto analyze the ongoing attacks efficiently with less false alarmrate respectively.It gives better accuracy and
reduces falsealarm rates.Rachnakulhare and Divakar Singh(2013) proposed an IDS which reduces the training time
and increases the detection accuracy. But Greater computational cost .Yogita B. Bhavsar and Kalyani C.
Waghmare(2013) proposed an IDS that has High Accuracy but extensive training time.Sandeep D et.al. (2014)
proposed a GA-based fuzzy Class Association Rule Mining with Sub-Attribute Utilization and its application to
classification, which can deal with discrete and continuous attributes at the same time and this method was applied
them to both misuse detection and anomaly detection and able to perform experiments with practical data provided by
KDD99 Cup.HarshitSaxena andDr.VineetRichariya (2014) proposed an IDS that has good detection rate in case of
Denial of Service (DoS) attack. But ,fail to achieve good detection rate in case of U2R and R2Lattack.
Volume 4, Issue 4, April 2015
Page 262
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 4, Issue 4, April 2015
ISSN 2319 - 4847
5. DATA MINING
It is the process of Extracting implicit, Previously Unknown and Potentially useful information from data.
Figure 3 Knowledge Discovery Process
Why Data Mining Techniques are used?
i) Since The Network Traffic is large , analysis of data is too hard.
ii) It ensures the accuracy and efficiency in detection process.
iii) It can also detect both known and previous unknown patterns of attacks.
DATA SET: The data applied in the research comes from NSL-KDD dataset .It is newest version of KDD Dataset
that consists of selected records of the complete KDD data set and is publicly available for researchers. NSL-KDD
solved the problem of KDD Dataset. The advantages of NSL-KDD data set over the original KDD data set is that It
does not include redundant records in the train set, so the classifiers will not be biased towards more frequent records.
In each connection are 41 attributes describing different features of the connection and a label assigned to each either as
an attack type or as normal. The data set contains a total of 24 attack types (connections) that fall into 4 major
categories: Denial of service (Dos), Probe, User to Root (U2R), Remote to User (R2L). Each record is labeled either
asnormal, or as an attack, with exactly one specific attack type .
6. DATA MINING TECHNIQUESFOR IDS
Different data mining techniques like Classification,Clustering,Association Rules,Feature Selection and Prediction are
widely used to acquire information about intrusions by observing network data.
Classification : It is a way to segment data by assigning it to groups that are already defined.The main goal of
Classification is to analyze the new records and then will be classified either as Normal or abnormal. Classification can
be effective for both anomaly detection and misuse detection,but mostly used for anomaly detection. Classification is
also called Supervised Learningbecause ,it is directed by these labeled objects.
Different Classification algorithm which are used in Intrusion detection system:
Svm: It is one of the most successful classification algorithm in the data mining area.It uses high dimension space to
find a hyperplane.It uses several kernel function that user can apply to solve different problem. The main goal of Svm is
to find a linear optimal hyperplane so that the margin of separation between 2 classes is maximized. Svm tries to
achieve maximum separation between the classes.
Figure 4 Support Vector Machine
Volume 4, Issue 4, April 2015
Page 263
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 4, Issue 4, April 2015
ISSN 2319 - 4847
In Svm,a predictor variable is called an Attribute , and a converted attribute that is usedto describe the hyperplane is
called a Feature.The process of selecting the mostsuitable representation is called Feature Selection.Svm is popular
because it can be
easy to use and this algorithm often has good generalization performance , and the samealgorithm solves a variety of
problems with little tuning.
Decision Tree : It is a classification technique in data mining,for predictive models.It is a flowchart like
structure,where internal node represents a test on attribute,branch represents an outcome of the test and leaf node
represents a class label.It use divide and conquer method for splitting of data and divide the data into their respective
class.It is very useful for large amounts of data and it provides high accuracy.A node of decision tree specifies an
attribute by which the data is to be partitioned.Each node has no. of edges,which are labeled according to a possible
value of the attribute,in the parent node.Nowadays,different enhanced version of Decision tree algorithm is used for
Inrusion Detection.
 ID3 Algorithm:ID3 is Iterative Dischotomiser3.It is one of the famous inductive logic programming methods. It
attempts to create smallest possible Decision tree.
 J48 Algorithm: J48 has additional features that were not deal in ID3.The no. of changes improved by J48:
 Missing values of attribute for handling training data.
 Discrete and continuous value attributes are handled.
Neural Network:Neural network was used to refer a network or biological neurons. It is used both in anomaly
intrusion detection as well as in misuse intrusion detection. For anomaly intrusion detection,neural network were
modeled to learn the typical characteristics of system users and identify statistically significant variations from the
user’s established behavior.
In misuse intrusion detection the neural network would receive data from the network stream and analyze the
information for instance of misuse.
Bayesian Network Based:It is a graphical model which contains the set of random variables and their conditional
dependencies in which each node represents the random variable and the non-connected node represents the variable
which are independent from each other.
 Naïve Baye’s Algorithm :Naïve Baye’s classifier use the Baye’s theorem to classify the new instances of data.The
naïve Baye’s classifier is probabilistic classifier,it Predict the class according to membership probability.
Bayes Theorem:P(H/X)= P(X/H).P(H)/ P(X)
Where, X is the data record, H is the Hypothesis whichrepresents data X, P(H) is prior probability, P(H/X) is the
probabilityof H conditioned on X and P(X/H) is the posterior probability of X conditioned on H.
K-Nearest Neighbor Algorithm:It is one of the simplest classification technique,and a type of lazy learning.It simply
stores a given training tuple and waits until it is given a test tuple.It is instance based learner that classifies the objects
based on closest training data. For a given unknown tuple,a k-neighbor looks the pattern space for the k-training tuples
,that are closest to the unknown tuple.Here,the object is classified by a majority vote of its neighbors.
Clustering:Human labelling is expensive and time consuming in case of classification,because the available network
information is too large.So,Clustering has attracted curiosity from researchers in the area of intrusion
detection.Clustering means grouping of data or dividing a large dataset into smaller datasets of some similarity without
using known structure of data.
Different types of clustering techniques which are used in Intrusion Detection System :
K-means Clustering Algorithm:In this clustering algorithm ,no. of cluster is predefined,which is specified by the
user.K-means algorithm creates cluster by determining a central mean of each cluster.The algorithm starts by randomly
select k-entities as the means of K-Clusters and randomly adds entities to each cluster.Then,it recomputes cluster
means and reassigns entities to clusters to which it is most similar based on the distance between entity and the cluster
mean.Then, it recomputed cluster means and reassigns entities to clusters to which it is most similar based on the
distance between entity and the cluster mean.Then the mean is recomputed at each cluster and previous entities either
stay/move to a different cluster and one iteration completes.Algorithm iterates until there is no change of the means at
each cluster.
K-medoids: Similar to K-Means,K-medoids is also clustering by partitioning algorithm ,which attempts to minimize
the distance between data points and its centroid.The most centrally located instance or data point is considered as
centroid in place of taking mean value.This centrally situated object is called Medoid or Reference Point.
Fuzzy c-Means Clustering Algorithm:The Fuzzy C-Means (FCM)algorithm is one of the most widelyused methods in
fuzzy clustering.In Fuzzy clustering each data point belongs to every cluster by some membership value and the process
of grouping is iterated till the change in the membership values of each data point stops changing.It is a method of the
clustering which allows one piece of the data belonged to 2 or more clusters.
FuzzyLogic+ K-Means Partition=Fuzzy C-Means
Volume 4, Issue 4, April 2015
Page 264
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 4, Issue 4, April 2015
ISSN 2319 - 4847
Association Rule:Association Rule Mining finds interesting association or correlation relationships among a large set
of data items,with massive amounts of data continuously being collected and stored.An Association rule is expressed by
X=>Y,where X and Y contain a set of attributes.This means that if a tuple satisfies X,it is also likely to satisfy Y.
The Apriori Algorithm:The name of algorithm is based on the fact that the algorithm uses prior knowledge of
frequent itemset properties.
 Apriori Property:All nonempty subset of a frequent itemset must also be frequent.
Feature Selection:The main idea in Feature selection is to remove features with little or no predictive information from
the original set of features of the audit data to form a subset of appropriate features.Feature selection significantly
reduces computational complexity resulting from using the full original feature set.It produces new attributes as linear
combination of existing Attributes.
Prediction:It uses model to predict continuous or ordered value for a given input.It discovers relationship between 1 or
more independent variable and relationship between dependent and independent variables.It is similar to human
learning experience.
7. PERFORMANCE MEASUREMENT OF IDS
Some of the factors used during performance measurement of IDS:
True positive (TP):The total number of normal data which are detected as a normal data during intrusion detection
process.
True negative (TN): In Intrusion detection, number of detected abnormal data which are actually abnormal data in
dataset.
False positive (FP)/False alarm: Total number of
detected normal data but they are actual attack.
False negative (FN):Number of detected abnormal
instances but in real they are normal data.
Performance of IDS is measured in terms of detection rate, accuracy and false alarm rate.
Confusion Matrix:
Predicted
Actual
0
1
0
1
TP
FN
FP
TN
Detection Rate (DR)= (TP/TP+FN) x 100%
False Alarm Rate (FAR)=FP/Number of Attacks
Accuracy=(TP+TN/TP + TN + FP + FN)x 100%
Error= 100- Accuracy
Recall(R) = TP/TP+FN
FNR= 1-R = FN/(TP+FN)
Precision(P) = TP/(TP+FP)
Specificity = TN/(TN+FP)
FPR= 1 – Specificity= FP/(TN+FP)
8.CATEGORIES OF ATTACK
Attacks are grouped into following four categories:
DoS-Denial of Service:Attackers disrupt a host or network service to make Legitimate users can not access the service
in the target machine means attacker makes the memory too busy or too full to handle the requests.e.g:The types of
attack comes under DOS are back, land, Neptune ,pod,smurf,teardrop etc.
Volume 4, Issue 4, April 2015
Page 265
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 4, Issue 4, April 2015
ISSN 2319 - 4847
R2L- Remote-to-Local: It is an attack in which attacker sends packet to a machine over a network but does not have
an account on that machine.E.g of R2L attacks are xterm, ftp-write,guess_password, imap, sendmail, phfetc
U2R -User to Root :It is an attack in which the attacker tries to access the normal user account.e.g of U2R are
buffer_overflow,sqlattack, perl,ps,Rootkit e.t.c.
Probes-Surveillance and Probing:It is a category of attacks where an attacker examines a network to discover wellknown vulnerabilities and gather information about the network of computers of the target machine.These network
investigations arereasonably valuable for an attacker who is planning an attack in future .e.g of probes are such
asmscan, saint, satan,portsweep etc.
Attack Categories
TABLE I
Table 1: Simulated attacks are grouped into four categories
9. PERFORMANCE ANALYSIS
Table 2: Theoretical comparison of different data mining Techniques
S.N
TYPE
O
METHOD
KEY FEATURE
1
Classificatio
3.NEURAL
n
NETWORK
4.BAYESIAN
NETWORK BASED
5.K-NEAREST
NEIGHBOUR
1.K-Means
Most commonly used
technique for
predicting a specific
outcome such as
response/no
response,high/medium/
low value
2.It is most widely used
2.It has high rate of
customer,likely to
method of data mining in
false alarm.
buy/not buy.
health care organization.
2.k-Medoids
2
useful for exploring
data and finding
natural groupings.
Clustering
5.Fuzzy C-Means
Volume 4, Issue 4, April 2015
DISADVANTAGE
1.This method can be
effective for both
1.This technique is
anomaly detection and
Less efficient than
misuse detection but
clustering technique.
mostly used for anomaly
detection.
1.SVM
2.DECISION TREE
INDUCTION
ADVANTAGE
1.It suffers from the
fact that once a merge
or split is committed, It
can't be undone or
refined.
2.Clustering is
performed not so much
2.It is very fast to
to keep records
compute on the database. together as to make it
easier to see when one
record sticks out from
1.Able to detect
intrusions in the audit
data without known
signature of intrusions.
Page 266
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 4, Issue 4, April 2015
ISSN 2319 - 4847
the rest.
3
Association
1.Aprori Algo
Rule
4
Feature
Selection
5
prediction
1.It can't be useful if
the information do not
Find Rules Associated 1.More accurate than
provide support and
classification.
with Frequently coconfidence of rule are
occuringitems,used for
correct
market basket
2.Association rule do
analysis,crosssell,root
not show reasonable
cause analysis,useful
2.Represent patterns in patterns with
for product bundling
data without specified dependent variable
in store placement and
target variable
and can't reduce the
defect analysis.
no. of independent
variable by removing.
1.Low Prediction
1.Shorter Training Time
Produces new
Accuracy.
attributes as linear
2.Remove
combination of
irrelevant,redundant or
existing attributes.
noisy data.
Use model to predict
1.It captures Repeatitive 1.There is no best
continuous or ordered
Patterns.
prediction approach.
value for a given input
2.Optimal Prediction is
2.Helps Automating
very hard problem and
Activities.
is not yet solved.
Table 3: Theoretical comparison of different classification techniques
Volume 4, Issue 4, April 2015
Page 267
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 4, Issue 4, April 2015
ISSN 2319 - 4847
Table 4: Comparative chart of different classification techniques
Volume 4, Issue 4, April 2015
Page 268
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 4, Issue 4, April 2015
CRITERIA
Input
Output
Membership Value
Computation Time
Purity of cluster
Empty Cluster
Generation
Efficiency
Number of Clusters an
Item Belongs
Overall Performance
Shape of Cluster
Detection Rate
False +ve Rate
ISSN 2319 - 4847
Table 5: Comparative chart of clustering techniques
K-MEAN
FUZZY C-MEAN
Number of clusters K Such that
Number of cluster C such that C<M.Set of
K<M.Set of data items
data items (X1,X2…..Xm).Set of Cluster
(X1,X2……Xm)
Centers (V1,V2….,Vc)
Set of K Clusters Where Each
Set of C clusters where each cluster has
cluster has similar items.
more similar items.
Does not Exist
Has a membership value as'µij'
Simple and Straight
Involves the calculation of Several
Forward,Require Less Time
Formulas So requires more time.
Low
High
May or May not generate
No
Work well for small Dataset.
Works well for small as well as large
dataset.
One
One or more than one cluster
Depends on Initial no. of cluster K
Works well for compact and
Globular Cluster
Highest
Lowest
Depends on Initial no. of cluster C
Works well for both globular and
NonGlobular Cluster
High
Lower
10.CONCLUSION AND FUTURE SCOPE
Now a days, Intrusion which affects the security and privacy of the system, has become major concern for many
organizations.Hence, there is a need of strong IDS which can detect novel attack with high attack detection accuracy.
Intrusion detection is an important but complex task for a computer system. Here, Various methods for intrusion
detection are studied and compared.
It is very difficult to conclude that a particular technique is best among all. Since, each technique has their own
advantages, and also disadvantages in comparison with other technique of intrusion detection. Combining more than
one data mining algorithms may be used to remove disadvantages of one another. Thus a combining approach has to be
made while selecting a mode to implement intrusion detection system. Combining a number of trained classifiers lead
to a better performance than any single classifier. On the basis of detection rate, accuracy, execution time and false
alarm rate, the paper has analyzed different classification and clustering data mining techniques for intrusion detection.
According to given necessary parameter, execution time of support vector machine is less and produces high accuracy
with smaller dataset and the main advantage of Fuzzy C-Means Clustering for intrusion detection is the high detection
rate and lower false positive rate. It works well for small as well as large dataset. Although Fuzzy C-Means is an
efficient technique,it is time consuming. The performance of intrusion detection systems can be still improved by
combining the features of Fuzzy C-Means clustering technique with SVM technique so that it reduces the time
required by Fuzzy C-Means for the clustering process and also increases the detection rate and decreases the false
positive rate thereby making the intrusion detection system more accurate and effective.
For the future directions , we would like to evaluate our work on NSL-KDD dataset. Besides, we would also like to
make real implementations on hybrid algorithm to practically experiment its effectiveness and apply it on real world
intrusion detection problems.
ACKNOWLEDGEMENT
I Give thanks to Almighty God to give an opportunity for doing research. And wish to acknowledge Dr. Vijay Kumar
Jha and Chandrasekhar Azad, both of Birla Institute of Technology for explaining the details of their experiments,
Suggestions and comments which really gave me an inspiration to do a comparative Study of Data Mining Techniques
For Intrusion Detection System.
REFERENCES
[1] David Ndumiyana1*, Richard Gotora2 and Hilton Chikwiriro,” Data Mining Techniques in Intrusion
Detection:Tightening Network Security”, International Journal of Engineering Research & Technology (IJERT)
Vol.2 Issue 5, May-2013 ISSN: 2278-0181
Volume 4, Issue 4, April 2015
Page 269
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 4, Issue 4, April 2015
ISSN 2319 - 4847
[2] V. Jaiganesh , S. Mangayarkarasi , Dr. P. Sumathi,”Intrusion Detection Systems:A Survey and Analysis of
Classification Techniques”,International Journal of Advanced Research in Computer and Communication
EngineeringVol. 2, Issue 4, April 2013
[3] D.Asir Antony Gnana Singh , E.Jebamalarleavline , ”Data Mining in Network Security-Techniques & Tools : A
Research
Prespective”,
Journal
of
Theoretical
and
Applied
Information
Technology
20th November 2013. Vol. 57 No.2
[4] Ms.RadhikaS.Landge, Mr.AvinashP.Wadhe,” Review of Various Intrusion Detection Techniques based on Data
Mining approach”, International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622,
Vol. 3, Issue 3, May-Jun 2013, pp.430.435
[5] A. M. Chandrashekhar and K. Raghuveer,”Fortification of Hybrid Intrusion Detection System Using variants of
neural networks and support vector machines”International Journal of Network Security & Its Applications
(IJNSA), Vol.5, No.1, January 2013
[6] Reema Patel, AmitThakkar, AmitGanatra, “A Survey and Comparative Analysis of Data Mining Techniques for
Network Intrusion Detection Systems, International Journal of Soft Computing and Engineering (IJCSE)
ISSN:2231-2307,Volume-2, Issue-1, March 2012
[7] Parekh S.P., Madan B.S and TugnayatR.M.,”Approach for Intrusion Detection System using Data Mining“,
Journal of Data Mining and Knowledge Discovery, ISSN: 2229-6662 &ISSN: 2229–6670, Volume 3, Issue 2,
2012, pp.-83-87
[8] Guang-Bin Huang, Dian Hui Wang and Yuan Lan, “Extremelearning machines: a survey”, Published: 25 May
2011_ Springer-Verlag,2011.
[9] E.Kesavulu Reddy, Member IAENG, V.Naveen Reddy, P.GovindaRajulu, “A Study of Intrusion Detection in Data
Mining” Vol III WCE 2011, July 6-8, 2011, London, U.K.
Volume 4, Issue 4, April 2015
Page 270
Download