IJSRSET calls volunteers interested to contribute towards the scientific development in the field of Science, Engineering and Technology

Home > IJSRSET1622445                                                     


Anomaly Detection in Network Using Data Mining Algorithms

Authors(3):

Amardeep Singh, Sharanjit Singh, Simmy
  • Abstract
  • Authors
  • Keywords
  • References
  • Details
ABSTRACT-In today’s world the security of computer system is of great concern. Because the last few years have seen a dramatic increase in the number of attacks, intrusion detection has become the mainstream of information insurance. Firewalls provide some protection. They do not provide full protection and still need to be complimented by an intrusion detection system. Data mining techniques are a new approach for intrusion detection. Recent studies show that as compared to the single algorithm, cascading of multiple algorithm’s gives much better performance. False alarm rate was also high in such system. Therefore, combination of different algorithms is performed to solve this problem. In this paper, we use two hybrid algorithms for developing the intrusion detection system. C4.5 decision tree and Support Vector Machine are combined to achieve high accuracy and diminish the wrong alarm rate. Data mining, or knowledge discovery, is the computer-assisted process of digging through and analyzing enormous sets of data and then extracting the meaning of the data. Data mining tools predict behaviors and future trends, allowing businesses to make proactive, knowledge-driven decisions. Data mining tools can answer business questions that traditionally were too time consuming to resolve. Data mining derives its name from the similarities between searching for valuable information in a large database and mining a mountain for a vein of valuable ore. Both processes require either sifting through an immense amount of material, or intelligently probing it to find where the value resides.

Amardeep Singh, Sharanjit Singh, Simmy

Data Mining, Support Vector Machine, VPN, SVC, SVR

  1. M.Xue,C.Zhu,"Applied Research on DataMiningAlgorithm in Network Intrusion Detection," International joint conference on artificial intelligence,2009.
  2. T.Bhavani et.al"Data Mining for security Application,"proceedings of the 2008 IEEE/IFIP international conference on embeded and ubiquitous computing-ol 02,IEEE computer society,2008
  3. Dorothy E.Denning."A Intrusion Detection Model" 1986 IEEE computer society symposium on research in security and privacy
  4. Xiang, M.Y.Chong and H.L.Zhu,"Design of multiple-leel tree classifiers for intrusion detection system",IEEE conference on cybernetics and intelligent system,2004.
  5. Peddabachigiri S., A.Abraham, Modeling of intrusion detecton system using hybrid intelligent systems," journals of network computer application,2007
  6. Mohammadreza Ektefa, et.al "intrusion detection using data mining techniques", pp200-203, IEEE,2010.
  7. www.pixshark.com.
  8. www.pengyifan.com.
  9. Sushil Kumar Chaturvedi, "anomaly detection in network using data mining techniques" IJETAC,2012
  10. www.anderson.ucla.edu/faculty/jason.fraud/teacher.technologies/palace/datamining.htm.
  11. www.laids.utexas.edu
  12. www.dataminingtools.net

Publication Details

Published in : Volume 2 | Issue 2 | March-April - 2016
Date of Publication Print ISSN Online ISSN
2016-05-05 2395-1990 2394-4099
Page(s) Manuscript Number   Publisher
1325-1328 IJSRSET1622445   Technoscience Academy

Cite This Article

Amardeep Singh, Sharanjit Singh, Simmy, "Anomaly Detection in Network Using Data Mining Algorithms", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 2, Issue 2, pp.1325-1328, March-April-2016.
URL : http://ijsrset.com/IJSRSET1622445.php