Hybrid classification model to detect advanced intrusions using data mining techniques

  • Authors

    • V Mala
    • K Meena
    2018-03-10
    https://doi.org/10.14419/ijet.v7i2.4.10031
  • Data Mining, Hybrid, Stuxnet, Flame, Duqu, Unsupervised Learning.
  • Traditional signature based approach fails in detecting advanced malwares like stuxnet, flame, duqu etc. Signature based comparison and correlation are not up to the mark in detecting such attacks. Hence, there is crucial to detect these kinds of attacks as early as possible. In this research, a novel data mining based approach were applied to detect such attacks. The main innovation lies on Misuse signature detection systems based on supervised learning algorithm. In learning phase, labeled examples of network packets systems calls are (gave) provided, on or after which algorithm can learn about the attack which is fast and reliable to known. In order to detect advanced attacks, unsupervised learning methodologies were employed to detect the presence of zero day/ new attacks. The main objective is to review, different intruder detection methods. To study the role of Data Mining techniques used in intruder detection system. Hybrid –classification model is utilized to detect advanced attacks.

  • References

    1. [1] Jonathon Ng, Deepti Joshi, Shankar M. Banik, “Applying Data Mining Techniques to Intrusion Detection†IEEE 2015.

      [2] G.V. Nadiammai, M. Hemalatha, “Effective approach toward Intrusion Detection System using data mining techniquesâ€, Elsevier Publication, 2013.

      [3] Jainapatel, Karunalpanchal, “Effective Intusion Detection System using Data Mining Techniquesâ€JETIR 2015.

      [4] Data Mining -Clustering, Institute of Computing Sciences, Poznan University of Technology, Poznan, Poland, Lecture 7, SE Master Course, 2009

      [5] Shikha Agrawal, Jitendra Agrawal, “Survey on Anomaly Detection using Data Mining Techniquesâ€, 19th International Conference on Knowledge Based and Intelligent Information and Engineering Systems, Procedia Computer Science 60, pp 708 https://doi.org/10.1016/j.procs.2015.08.220.

      [6] Abhaya, Kaushal Kumar, Ranjeeta Jha, SumaiyaAfroz, “Data Mining Techniques for Intrusion Detection: A Reviewâ€, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, Issue 6, pp 6938-6942, June 2014.

      [7] Saurabh Mukherjee, Neelam Sharma, “Intrusion Detection using Naive Bayes Classifier with Feature Reductionâ€, Procedia technology, ScienceDirect, Elsevier Publication, 2012, https://doi.org/10.1016/j.protcy.2012.05.017.

      [8] M. Ali Aydın, A. Halim Zaim, K. GokhanCeylan, “A hybrid intrusion detection system design for computer network securityâ€, Computers and Electrical Engineering, Elsevier Publication, 2009, https://doi.org/10.1016/j.compeleceng.2008.12.005.

      [9] Basant Agarwal, Namita Mittal, “Hybrid Approach for Detection of Anomaly Network Traffic using Data Mining Techniquesâ€, 2nd International Conference on Communication, Computing & Security, Procedia technology, Science Direct, Elsevier Publication, 2012, https://doi.org/10.1016/j.protcy.2012.10.121.

      [10] AditiPurohit, Hitesh Gupta, “Hybrid Intrusion Detection System Model using Clustering, Classification and Decision Table†IEEE 2013.

      [11] Anderson JP. Computer security threat monitoring and surveil-lance. In: Technical report. Fort Washington, Pennsylvania: James P Anderson co.; 1980

      [12] TruptiPhutane, Prof. ApashabiPathan, “Intrusion Detection System using Decision Tree &AprioriAlgorithmâ€IJCET 2015.

      [13] Dr.SaurabhMukherjeea, Neelam Sharma, “Intrusion Detection using Naive Bayes Classifier with Feature Reduction†IEEE 2012.

      [14] Duanyang Zhao, QingxiangXu, ZhilinFeng, “Analysis and Design for Intrusion Detection System Based on Data Mining†IEEE 2010.

      [15] Dr. M. Hanumanthappa, Manish Kumar, Dr. T. V. Suresh Kumar, “Intrusion Detection System Using Decision Tree Algorithm†IEEE 2012.

  • Downloads

  • How to Cite

    Mala, V., & Meena, K. (2018). Hybrid classification model to detect advanced intrusions using data mining techniques. International Journal of Engineering & Technology, 7(2.4), 10-13. https://doi.org/10.14419/ijet.v7i2.4.10031