Research Paper | Computer Science & Engineering | Iraq | Volume 6 Issue 12, December 2017
Attack Detection Based on Data Mining Techniques
Dr. Buthynna Fahran, Dr. Mohammed Najm, Mustafa Abdulsamea Abdulhamed
In light of the security challenges posed by the reality of today, where the Internet and exchange information are an integral part of our daily lives, we live in a world where data requirements have become dynamic, where things are permanently changing. In order to provide security and decrease the damage of information system caused by attacks on the network, it is important to provide it with Intrusion Detection system (IDS). In this paper, we present intrusion detection model based on Feature extraction and two-stage classifier module, designed to detect anomaly activities. The proposed model using Principal Component Analysis (PCA) of Feature extraction to map the high dimensional dataset to a lower one with effective features. We then apply a two-stage classification module utilizing Nave Bayes and C4.5 to identify abnormal behaviors. The experiment results using NSL-KDD dataset shows that Our model outperforms the previous model for detection low-frequency attacks.
Keywords: intrusion detection system, multi-stage classification, anomaly detection, NSL-KDD
Edition: Volume 6 Issue 12, December 2017
Pages: 1547 - 1551
How to Cite this Article?
Dr. Buthynna Fahran, Dr. Mohammed Najm, Mustafa Abdulsamea Abdulhamed, "Attack Detection Based on Data Mining Techniques", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20179053, Volume 6 Issue 12, December 2017, 1547 - 1551
113 PDF Views | 95 PDF Downloads
Similar Articles with Keyword 'intrusion detection system'
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1317 - 1319A Survey on Usage of Artificial Intelligence Algorithm in Efficiency of WSN
Chaitanya Sharma
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1571 - 1574Energy Efficient Secure Routing using Clustering Approach in HWSN
Shani Verma, Maya Shelke
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1440 - 1445Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques
Snehal B Rase, Pranjali Deshmukh
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2085 - 2089Implementation and Analysis of DoS Attack Detection Algorithms
Rupesh Jaiswal, Dr. Shashikant Lokhande, Aditya Gulavani
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1220 - 1223EAACK-An Innovative Intrusion Detection System for MANET using Digital Signature
Prof. G. M.Bhandari, Swati Pawar, Varsha Zaware, Ujjawala Bankar
Similar Articles with Keyword 'anomaly detection'
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 1825 - 1828Link-Anomaly Detection in Twitter Streams
Shari P S
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 2011 - 2014Attack Detection and Mitigation for AGC
Pooja A Kulkarni, Harshal A Karande
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 3054 - 3057A Hybrid System Using Genetic Algorithm for Anomaly Intrusion Detection
Arpitha J, Nagaraj Naik
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 1449 - 1452Anomalous Events Detection in Frequent Sequence Video via Object Segmentation Using Motion Pixel Compensation and Gradient
S. Tamilselvan, B. Monika
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 3151 - 155A Survey: Recent Autonomous Security Techniques for Detection & Avoidance of Network Attacks
Supriya Gupta, Ankur Goyal
Similar Articles with Keyword 'NSL-KDD'
Research Paper, Computer Science & Engineering, Iraq, Volume 6 Issue 12, December 2017
Pages: 1547 - 1551Attack Detection Based on Data Mining Techniques
Dr. Buthynna Fahran, Dr. Mohammed Najm, Mustafa Abdulsamea Abdulhamed
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 985 - 990Enhancing Security and Event Management Using Association Rule Mining
M. Nithya, A. Komathi