Adequacyscrutinyof Intrusion Detection Techniques Over Discrete Dataset’s

  • Authors

    • Neha Singh
    • Dr. Deepali Virmani
    2018-11-30
    https://doi.org/10.14419/ijet.v7i4.28.28334
  • Intrusion, wireless sensor network, intrusion detection techniques, data mining, machine learning, fuzzy rules.
  • Abstract

    Intrusion detection is one of the major issues in wireless sensor networks. There is a drastic change in algorithms dealing with intrusion detections due to rapid change in types of intrusion. The paper presents a scrutiny of various intrusion detection techniques over various datasets and illustrates how these algorithms have evolved with time. The scrutiny is based on various parameters such as various types of technologies used to propose new systems and number of publications over a period of time, accuracy of intrusion detection rate of various data sets. The analysis concludes that their is a significant increase in new intrusion detection systems over time. The analysis also concludes that researchers are gradually shifting from old data sets to new data set to validate their systems. There is a rapid growth in systems using machine learning for intrusion detection systems.

     


  • References

    1. [1] Borah, S., Panigrahi, R., & Chakraborty, A. (2018). An Enhanced Intrusion Detection System Based on Clustering. In Progress in Advanced Computing and Intelligent Engineering (pp. 37-45). Springer, Singapore.

      [2] Roshan, S., Miche, Y., Akusok, A., & Lendasse, A. (2017). Adaptive and online network intrusion detection system using clustering and Extreme Learning Machines. Journal of the Franklin Institute.

      [3] Leu, F. Y., Tsai, K. L., Hsiao, Y. T., & Yang, C. T. (2017). An internal intrusion detection and protection system by using data mining and forensic techniques. IEEE Systems Journal, 11(2), 427-438.

      [4] Al-Yaseen, W. L., Othman, Z. A., & Nazri, M. Z. A. (2017). Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system. Expert Systems with Applications, 67, 296-303.

      [5] Ashfaq, R. A. R., Wang, X. Z., Huang, J. Z., Abbas, H., & He, Y. L. (2017). Fuzziness based semi-supervised learning approach for intrusion detection system. Information Sciences, 378, 484-497.

      [6] Otoum, S., Kantarci, B., & Mouftah, H. T. (2017). Detection of Known and Unknown Intrusive Sensor Behavior in Critical Applications. IEEE Sensors Letters, 1(5), 1-4.

      [7] Mrugala, K., Tuptuk, N., & Hailes, S. (2017). Evolving attackers against wireless sensor networks using genetic programming. IET Wireless Sensor Systems.

      [8] Padmaja, P., & Marutheswar, G. V. (2017, January). Detection of Malicious Node in Wireless Sensor Network. In Advance Computing Conference (IACC), 2017 IEEE 7th International (pp. 193-198). IEEE.

      [9] Prabha, V. R., & Latha, P. (2017). Fuzzy Trust Protocol for Malicious Node Detection in Wireless Sensor Networks. Wireless Personal Communications, 94(4), 2549-2559.

      [10] Mahapatra, B., & Patnaik, S. (2016). Self Adaptive Intrusion Detection Technique Using Data Mining Concept in an Ad-hoc Network. Procedia Computer Science, 92, 292-297.

      [11] Tang, C., Xiang, Y., Wang, Y., Qian, J., & Qiang, B. (2016). Detection and classification of anomaly intrusion using hierarchy clustering and SVM. Security and Communication Networks, 9(16), 3401-3411.

      [12] Esmaily, J., Moradinezhad, R., & Ghasemi, J. (2015, May). Intrusion detection system based on Multi-Layer Perceptron Neural Networks and Decision Tree. In Information and Knowledge Technology (IKT), 2015 7th Conference on (pp. 1-5). IEEE.

      [13] Lin, W. C., Ke, S. W., & Tsai, C. F. (2015). CANN: An intrusion detection system based on combining cluster centers and nearest neighbors. Knowledge-based systems, 78, 13-21.

      [14] Elhag, S., Fernández, A., Bawakid, A., Alshomrani, S., & Herrera, F. (2015). On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on Intrusion Detection Systems. Expert Systems with Applications, 42(1), 193-202.

      [15] Choksi, K., Shah, B., & Kale, O. (2014). Intrusion detection system using self organizing map: a surevey. Int. J. Engin. Res. Appl, 4(12), 11-16.

      [16] Ranjan, R., & Sahoo, G. (2014). A new clustering approach for anomaly intrusion detection. arXiv preprint arXiv:1404.2772.

      [17] Nadiammai, G. V., & Hemalatha, M. (2014). Effective approach toward Intrusion Detection System using data mining techniques. Egyptian Informatics Journal, 15(1), 37-50.

      [18] Sathyamoorthi, T., Vijayachakaravarthy, D., Divya, R., & Nandhini, M. (2014). A simple and effective scheme to find malicious node in wireless sensor network. International Journal of Research in Engg. And Tech, 3(2).

      [19] Jha, J., & Ragha, L. (2013). Intrusion detection system using support vector machine. International Journal of Applied Information Systems (HAIS)-ISSN, 2249-0868.

      [20] Fawzy, A., Mokhtar, H. M., & Hegazy, O. (2013). Outliers detection and classification in wireless sensor networks. Egyptian Informatics Journal, 14(2), 157-164.

      [21] Coppolino, L., D'Antonio, S., Garofalo, A., & Romano, L. (2013, October). Applying data mining techniques to intrusion detection in wireless sensor networks. In P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), 2013 Eighth International Conference on (pp. 247-254). IEEE.

      [22] Virmani, D., Soni, A., Hemrajani, M., & Chandel, S. (2013). Dynamic Clustering to Detect Malicious Nodes in Wireless Sensor Network.

      [23] Srivastava, M., & Mishra, S. (2012). EXISTING TRENDS IN INTRUSION DETECTION - A COMPARATIVE ANALYSIS. International Journal of Information Technology and Knowledge Management,5(1), 79-83.

      [24] Yim, S. J., & Choi, Y. H. (2012). Neighbor-based malicious node detection in wireless sensor networks. Wireless Sensor Network, 4(09), 219.

      [25] Mabu, S., Chen, C., Lu, N., Shimada, K., & Hirasawa, K. (2011). An intrusion-detection model based on fuzzy class-association-rule mining using genetic network programming. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 41(1), 130-139.

      [26] Muda, Z., Yassin, W., Sulaiman, M. N., & Udzir, N. I. (2011, July). Intrusion detection based on K-Means clustering and Naïve Bayes classification. In Information Technology in Asia (CITA 11), 2011 7th International Conference on (pp. 1-6). IEEE.

      [27] Horng, S. J., Su, M. Y., Chen, Y. H., Kao, T. W., Chen, R. J., Lai, J. L., & Perkasa, C. D. (2011). A novel intrusion detection system based on hierarchical clustering and support vector machines. Expert systems with Applications, 38(1), 306-313.

      [28] Wang, G., Hao, J., Ma, J., & Huang, L. (2010). A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering. Expert systems with applications, 37(9), 6225-6232.

      [29] Zhang, Y., Meratnia, N., & Havinga, P. (2010). Outlier detection techniques for wireless sensor networks: A survey. IEEE Communications Surveys & Tutorials, 12(2), 159-170.

      [30] Tajbakhsh, A., Rahmati, M., & Mirzaei, A. (2009). Intrusion detection using fuzzy association rules. Applied Soft Computing, 9(2), 462-469.

      [31] Wang, C. D., Yu, H. F., & Wang, H. B. (2009). Grey self-organizing map based intrusion detection. Optoelectronics Letters, 5(1), 64-68.

      [32] Tsai, C. F., Hsu, Y. F., Lin, C. Y., & Lin, W. Y. (2009). Intrusion detection by machine learning: A review. Expert Systems with Applications, 36(10), 11994-12000.

      [33] Leu, F. Y., & Hu, K. W. (2008). A real-time intrusion detection system using data mining technique. Journal of Systemics, Cybernetics and Informatics, 6(2), 36-41.

      [34] Xiang, C., Yong, P. C., & Meng, L. S. (2008). Design of multiple-level hybrid classifier for intrusion detection system using Bayesian clustering and decision trees. Pattern Recognition Letters, 29(7), 918-924.

      [35] Davanzo, G., Medvet, E., & Bartoli, A. (2008, September). A comparative study of anomaly detection techniques in Web site defacement detection. In IFIP International Information Security Conference (pp. 711-716). Springer, Boston, MA.

      [36] Lee, M. H., & Choi, Y. H. (2008). Fault detection of wireless sensor networks. Computer Communications, 31(14), 3469-3475.

      [37] Lee, H., Song, J., & Park, D. (2005). Intrusion detection system based on multi-class SVM. Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing, 511-519.

  • Downloads

  • How to Cite

    Singh, N., & Deepali Virmani, D. (2018). Adequacyscrutinyof Intrusion Detection Techniques Over Discrete Dataset’s. International Journal of Engineering & Technology, 7(4.28), 626-630. https://doi.org/10.14419/ijet.v7i4.28.28334

    Received date: 2019-03-13

    Accepted date: 2019-03-13

    Published date: 2018-11-30