Attack Detection Based on Data Mining Techniques
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | Iraq | Volume 6 Issue 12, December 2017

Attack Detection Based on Data Mining Techniques

Dr. Buthynna Fahran, Dr. Mohammed Najm, Mustafa Abdulsamea Abdulhamed

In light of the security challenges posed by the reality of today, where the Internet and exchange information are an integral part of our daily lives, we live in a world where data requirements have become dynamic, where things are permanently changing. In order to provide security and decrease the damage of information system caused by attacks on the network, it is important to provide it with Intrusion Detection system (IDS). In this paper, we present intrusion detection model based on Feature extraction and two-stage classifier module, designed to detect anomaly activities. The proposed model using Principal Component Analysis (PCA) of Feature extraction to map the high dimensional dataset to a lower one with effective features. We then apply a two-stage classification module utilizing Nave Bayes and C4.5 to identify abnormal behaviors. The experiment results using NSL-KDD dataset shows that Our model outperforms the previous model for detection low-frequency attacks.

Keywords: intrusion detection system, multi-stage classification, anomaly detection, NSL-KDD

Edition: Volume 6 Issue 12, December 2017

Pages: 1547 - 1551

Share this Article

How to Cite this Article?

Dr. Buthynna Fahran, Dr. Mohammed Najm, Mustafa Abdulsamea Abdulhamed, "Attack Detection Based on Data Mining Techniques", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20179053, Volume 6 Issue 12, December 2017, 1547 - 1551

113 PDF Views | 95 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'intrusion detection system'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1317 - 1319

A Survey on Usage of Artificial Intelligence Algorithm in Efficiency of WSN

Chaitanya Sharma

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1571 - 1574

Energy Efficient Secure Routing using Clustering Approach in HWSN

Shani Verma, Maya Shelke

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1440 - 1445

Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques

Snehal B Rase, Pranjali Deshmukh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2085 - 2089

Implementation and Analysis of DoS Attack Detection Algorithms

Rupesh Jaiswal, Dr. Shashikant Lokhande, Aditya Gulavani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1220 - 1223

EAACK-An Innovative Intrusion Detection System for MANET using Digital Signature

Prof. G. M.Bhandari, Swati Pawar, Varsha Zaware, Ujjawala Bankar

Share this Article

Similar Articles with Keyword 'anomaly detection'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1825 - 1828

Link-Anomaly Detection in Twitter Streams

Shari P S

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 2011 - 2014

Attack Detection and Mitigation for AGC

Pooja A Kulkarni, Harshal A Karande

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3054 - 3057

A Hybrid System Using Genetic Algorithm for Anomaly Intrusion Detection

Arpitha J, Nagaraj Naik

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1449 - 1452

Anomalous Events Detection in Frequent Sequence Video via Object Segmentation Using Motion Pixel Compensation and Gradient

S. Tamilselvan, B. Monika

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3151 - 155

A Survey: Recent Autonomous Security Techniques for Detection & Avoidance of Network Attacks

Supriya Gupta, Ankur Goyal

Share this Article

Similar Articles with Keyword 'NSL-KDD'

Research Paper, Computer Science & Engineering, Iraq, Volume 6 Issue 12, December 2017

Pages: 1547 - 1551

Attack Detection Based on Data Mining Techniques

Dr. Buthynna Fahran, Dr. Mohammed Najm, Mustafa Abdulsamea Abdulhamed

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 985 - 990

Enhancing Security and Event Management Using Association Rule Mining

M. Nithya, A. Komathi

Share this Article
Top