An Intrusion Detection Model for Detecting Type of Attack Using Data Mining
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 3 Issue 5, May 2014

An Intrusion Detection Model for Detecting Type of Attack Using Data Mining

Amruta Surana, Shyam Gupta

Intrusion detection systems (IDS) are important elements in a networks defenses to help protect against increasingly sophisticated cyber attacks. This project objective presents a novel anomaly detection technique that can b e u s e d to detect previously unknown attacks on a network by identifying attack features. This effects -based feature identification method uniquely combines k-means clustering; NaveBayes feature selection and 4.5 d e c i s i o n tree classification for finding cyber attacks with a high degree of accuracy and it used KDD99CUP dataset as input. Basically it detect whether this attacks are there or not like IPSWEEP; NEPTUNE; SMURF. Conclusions: Give brief concluding remarks on outcomes of what attacks are present and how to find.

Keywords: Clustering, Classification, Decision trees, Feature, selection, Intrusion detection

Edition: Volume 3 Issue 5, May 2014

Pages: 1496 - 1500

Share this Article

How to Cite this Article?

Amruta Surana, Shyam Gupta, "An Intrusion Detection Model for Detecting Type of Attack Using Data Mining", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20132180, Volume 3 Issue 5, May 2014, 1496 - 1500

87 PDF Views | 68 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Clustering'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1936 - 1938

A Mining Method to Predict Patient's DOSH

Ruchi Rathor, Pankaj Agarkar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1063 - 1066

A Survey on Automatic Fault Detection Framework for Cloud based Application

Kshitija Nandgaonkar, Swarupa Kamble

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1326 - 1329

Community Detection in Complex Network

Shikha Vishnoi

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2253 - 2256

Survey on Hubness - Based Clustering Algorithms

Nikita Dhamal, Antara Bhatttacharya

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1164 - 1169

A Survey on Scalable Big Data Analytics Platform

Ravindra Phule, Madhav Ingle

Share this Article

Similar Articles with Keyword 'Classification'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1936 - 1938

A Mining Method to Predict Patient's DOSH

Ruchi Rathor, Pankaj Agarkar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1888 - 1890

Spammer Detection and Identification on Social Network Using Machine Learning

Dr. Shameem Akhter, Noorain Saba

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 16 - 20

A Comprehensive Review on Intents, Intention Mining and Intention Classification

Saroj S. Date

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1869 - 1872

A Technique to Combine Feature Selection with Instance Selection for Effective Bug Triage

Suvarna Kale, Ajay Kumar Gupta

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1642 - 1643

A Survey Paper on Various Encryption & Data Hiding Methods for Video Streams

Shrutika S. Giradkar, Antara Bhattacharya

Share this Article

Similar Articles with Keyword 'Decision trees'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 759 - 761

Empirical Study of Fake Reviews Detection of Online Reviews from E-Commerce Website

Phani K. Cheruku, Atul Kumar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1021 - 1023

Privacy Preserving Mining Based Framework for Analyzing the Patient Behavior

Dhanashree M. Patil, Dnyaneshwar A. Rokade

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2891 - 2894

A Survey on Privacy-Preserving Data Mining using Random Decision Tree

Komal N. Chouragade, Trupti H. Gurav

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 2110 - 2113

Survey Paper on Data Mining Using Neural Network

Rasika P. Ghom, N. R. Chopde

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1679 - 1683

Comparative Result of Building Decision Tree for Imbalanced Datasets

Kavita Rathod, Pramod Patil

Share this Article

Similar Articles with Keyword 'Feature'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1454 - 1458

Heart Disease Prediction with Machine Learning Approaches

Megha Kamboj

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 457 - 461

Artificial Intelligence for Hiring

Ishan Borker, Ashok Veda

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1936 - 1938

A Mining Method to Predict Patient's DOSH

Ruchi Rathor, Pankaj Agarkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013

Pages: 165 - 167

Statistical Analysis of DCT Coefficients for Ascertaining Ear's Biometrics

Nisha, Jatinder Kansal, JPS Raina

Share this Article

Similar Articles with Keyword 'selection'

Case Studies, Computer Science & Engineering, Saudi Arabia, Volume 9 Issue 11, November 2020

Pages: 1438 - 1445

Business Process Automation and Re-engineering for Enhancing Recruitment and Selection Process: Case study in Refining & Petrochemical Company

Aisha Alturkistani, Elaaf Aljohani, Raghad Alharbi, Rahaf Assar, Sara Aloufi, Dr. Salma Mahgoub

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1838 - 1842

Predicting and Extending of Sensor Lifetime in Wireless Sensor Networks using Fuzzy Logic

Pawan Kumar, Manoj Challa

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2081 - 2083

Survey of Approximate Shortest Distance Computing Using Improved Shortest Path Tree

Sonali Malode, Mansi Bhonsle

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1869 - 1872

A Technique to Combine Feature Selection with Instance Selection for Effective Bug Triage

Suvarna Kale, Ajay Kumar Gupta

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2423 - 2426

Initial Fault Detection by Using RAEED Protocol in Face Tracking Technique

Anuradha M. Joshi, Jagruti J. Shah

Share this Article

Similar Articles with Keyword 'Intrusion detection'

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1440 - 1445

Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques

Snehal B Rase, Pranjali Deshmukh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1317 - 1328

An Efficient Approach of Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

Shaik Shanawaz, K. Thyagarajan

Share this Article

Comparative Studies, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1966 - 1971

Comparative Analysis of Hybrid Intrusion Detection System and Intrusion Prevention System for MANET

Pallavi P Puri, Nitin R. Chopde

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1954 - 1955

Internal Intrusion Detection Systems

Bhingardive Deepali R, Ranmalkar Vrushali S

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 1758 - 1764

Data Transfer Based on Between the Node Coverge Area Using Diffe-Hellman Key Algorithm in Adhoc Network

T. Sankar, M. Prakash

Share this Article
Top