M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 3 Issue 5, May 2014
An Intrusion Detection Model for Detecting Type of Attack Using Data Mining
Amruta Surana, Shyam Gupta
Intrusion detection systems (IDS) are important elements in a networks defenses to help protect against increasingly sophisticated cyber attacks. This project objective presents a novel anomaly detection technique that can b e u s e d to detect previously unknown attacks on a network by identifying attack features. This effects -based feature identification method uniquely combines k-means clustering; NaveBayes feature selection and 4.5 d e c i s i o n tree classification for finding cyber attacks with a high degree of accuracy and it used KDD99CUP dataset as input. Basically it detect whether this attacks are there or not like IPSWEEP; NEPTUNE; SMURF. Conclusions: Give brief concluding remarks on outcomes of what attacks are present and how to find.
Keywords: Clustering, Classification, Decision trees, Feature, selection, Intrusion detection
Edition: Volume 3 Issue 5, May 2014
Pages: 1496 - 1500
How to Cite this Article?
Amruta Surana, Shyam Gupta, "An Intrusion Detection Model for Detecting Type of Attack Using Data Mining", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20132180, Volume 3 Issue 5, May 2014, 1496 - 1500
129 PDF Views | 97 PDF Downloads
Similar Articles with Keyword 'Clustering'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1936 - 1938A Mining Method to Predict Patients DOSH
Ruchi Rathor, Pankaj Agarkar
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 2253 - 2256Survey on Hubness - Based Clustering Algorithms
Nikita Dhamal, Antara Bhatttacharya
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1742 - 1745Enhancement of Leach Protocol in Wireless Sensor Network
Bipin Patel, Hardik Kadiya
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2461 - 2466A Review of Text Mining Techniques Associated with Various Application Areas
Dr. Shilpa Dang, Peerzada Hamid Ahmad
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2413 - 2417A Review on Heterogeneous Protocols for Wireless Sensor Network
Amarjit Kaur, Simarjeet Kaur
Similar Articles with Keyword 'Classification'
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1615 - 1620Traffic Sign Detection via Graph Based Ranking and Segmentation Algorithm
Premsai Cheedella
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1936 - 1938A Mining Method to Predict Patients DOSH
Ruchi Rathor, Pankaj Agarkar
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1907 - 1913Human Gait Recognition Using Multisvm Classifier
Saranya Sasidharan, Smitha K S, Minu Thomas
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 2161 - 2168Vision Based Fire Flame Detection System Using Optical flow Features and Artificial Neural Network
Anila R. Kurup
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 3069 - 3074On the Utilization Aspect of Document Data for Mining the Side Information
N.S. Krishna Prasad, S. Dhana Sekaran
Similar Articles with Keyword 'Decision trees'
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020
Pages: 759 - 761Empirical Study of Fake Reviews Detection of Online Reviews from E-Commerce Website
Phani K. Cheruku, Atul Kumar
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2891 - 2894A Survey on Privacy-Preserving Data Mining using Random Decision Tree
Komal N. Chouragade, Trupti H. Gurav
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 862 - 865Survey on Gaussian Estimation Based Decision Trees for Data Streams Mining
Poonam M Jagdale, Devendra P Gadekar
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 2110 - 2113Survey Paper on Data Mining Using Neural Network
Rasika P. Ghom, N. R. Chopde
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1496 - 1500An Intrusion Detection Model for Detecting Type of Attack Using Data Mining
Amruta Surana, Shyam Gupta
Similar Articles with Keyword 'Feature'
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020
Pages: 457 - 461Artificial Intelligence for Hiring
Ishan Borker, Ashok Veda
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Research Paper, Computer Science & Engineering, China, Volume 10 Issue 1, January 2021
Pages: 1165 - 1168A Capsule Robot Attitude Transformation Perception Method based on Intestinal Fold Features
Chengcheng Yan, Yanping Hu
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1936 - 1938A Mining Method to Predict Patients DOSH
Ruchi Rathor, Pankaj Agarkar
Similar Articles with Keyword 'selection'
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2081 - 2083Survey of Approximate Shortest Distance Computing Using Improved Shortest Path Tree
Sonali Malode, Mansi Bhonsle
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013
Pages: 202 - 204Detection & Selection of Skin and Skin like Background under Complex Background
Sangita Gudadhe, Priti Subramanium
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 747 - 749A Survey of Friendbook Recommendation Services
Pankaj L. Pingate, S. M. Rokade
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 1838 - 1842Predicting and Extending of Sensor Lifetime in Wireless Sensor Networks using Fuzzy Logic
Pawan Kumar, Manoj Challa
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1380 - 1385Selecting Effectual Peers in P2P Webs for Task Calculating
Rajalakshmi.V, Gayathri, Swathi Durga, M. Narayanan
Similar Articles with Keyword 'Intrusion detection'
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1317 - 1319A Survey on Usage of Artificial Intelligence Algorithm in Efficiency of WSN
Chaitanya Sharma
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1571 - 1574Energy Efficient Secure Routing using Clustering Approach in HWSN
Shani Verma, Maya Shelke
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1440 - 1445Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques
Snehal B Rase, Pranjali Deshmukh
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2085 - 2089Implementation and Analysis of DoS Attack Detection Algorithms
Rupesh Jaiswal, Dr. Shashikant Lokhande, Aditya Gulavani
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 1689 - 1692ISRV: Intrusion Detection, Selection of Counter Measures and Recovery of Virtual Network Systems
Vinod Kumar, Syeda Asra, Yallappa Meti