Anomaly Detection in Network Using Data Mining Algorithms

Authors

  • Amardeep Singh  G.N.D.U Regional Campus, Gurdaspur, Punjab, India
  • Sharanjit Singh  G.N.D.U Regional Campus, Gurdaspur, Punjab, India
  • Simmy  G.N.D.U Regional Campus, Gurdaspur, Punjab, India

Keywords:

Data Mining, Support Vector Machine, VPN, SVC, SVR

Abstract

ABSTRACT-In today’s world the security of computer system is of great concern. Because the last few years have seen a dramatic increase in the number of attacks, intrusion detection has become the mainstream of information insurance. Firewalls provide some protection. They do not provide full protection and still need to be complimented by an intrusion detection system. Data mining techniques are a new approach for intrusion detection. Recent studies show that as compared to the single algorithm, cascading of multiple algorithm’s gives much better performance. False alarm rate was also high in such system. Therefore, combination of different algorithms is performed to solve this problem. In this paper, we use two hybrid algorithms for developing the intrusion detection system. C4.5 decision tree and Support Vector Machine are combined to achieve high accuracy and diminish the wrong alarm rate. Data mining, or knowledge discovery, is the computer-assisted process of digging through and analyzing enormous sets of data and then extracting the meaning of the data. Data mining tools predict behaviors and future trends, allowing businesses to make proactive, knowledge-driven decisions. Data mining tools can answer business questions that traditionally were too time consuming to resolve. Data mining derives its name from the similarities between searching for valuable information in a large database and mining a mountain for a vein of valuable ore. Both processes require either sifting through an immense amount of material, or intelligently probing it to find where the value resides.

References

  1. M.Xue,C.Zhu,"Applied Research on DataMiningAlgorithm in Network Intrusion Detection," International joint conference on artificial intelligence,2009.
  2. T.Bhavani et.al"Data Mining for security Application,"proceedings of the 2008 IEEE/IFIP international conference on embeded and ubiquitous computing-ol 02,IEEE computer society,2008
  3. Dorothy E.Denning."A Intrusion Detection Model" 1986 IEEE computer society symposium on research in security and privacy
  4. Xiang, M.Y.Chong and H.L.Zhu,"Design of multiple-leel tree classifiers for intrusion detection system",IEEE conference on cybernetics and intelligent system,2004.
  5. Peddabachigiri S., A.Abraham, Modeling of intrusion detecton system using hybrid intelligent systems," journals of network computer application,2007
  6. Mohammadreza Ektefa, et.al "intrusion detection using data mining techniques", pp200-203, IEEE,2010.
  7. www.pixshark.com.
  8. www.pengyifan.com.
  9. Sushil Kumar Chaturvedi, "anomaly detection in network using data mining techniques" IJETAC,2012
  10. www.anderson.ucla.edu/faculty/jason.fraud/teacher.technologies/palace/datamining.htm.
  11. www.laids.utexas.edu
  12. www.dataminingtools.net

Downloads

Published

2017-12-31

Issue

Section

Research Articles

How to Cite

[1]
Amardeep Singh, Sharanjit Singh, Simmy, " Anomaly Detection in Network Using Data Mining Algorithms, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 2, Issue 2, pp.1325-1328, March-April-2016.