International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 111

Research Paper | Computer Science & Engineering | Iraq | Volume 6 Issue 12, December 2017


Attack Detection Based on Data Mining Techniques

Dr. Buthynna Fahran | Dr. Mohammed Najm [3] | Mustafa Abdulsamea Abdulhamed


Abstract: In light of the security challenges posed by the reality of today, where the Internet and exchange information are an integral part of our daily lives, we live in a world where data requirements have become dynamic, where things are permanently changing. In order to provide security and decrease the damage of information system caused by attacks on the network, it is important to provide it with Intrusion Detection system (IDS). In this paper, we present intrusion detection model based on Feature extraction and two-stage classifier module, designed to detect anomaly activities. The proposed model using Principal Component Analysis (PCA) of Feature extraction to map the high dimensional dataset to a lower one with effective features. We then apply a two-stage classification module utilizing Nave Bayes and C4.5 to identify abnormal behaviors. The experiment results using NSL-KDD dataset shows that Our model outperforms the previous model for detection low-frequency attacks.


Keywords: intrusion detection system, multi-stage classification, anomaly detection, NSL-KDD


Edition: Volume 6 Issue 12, December 2017,


Pages: 1547 - 1551


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Dr. Buthynna Fahran, Dr. Mohammed Najm, Mustafa Abdulsamea Abdulhamed, "Attack Detection Based on Data Mining Techniques", International Journal of Science and Research (IJSR), Volume 6 Issue 12, December 2017, pp. 1547-1551, https://www.ijsr.net/get_abstract.php?paper_id=ART20179053

Similar Articles with Keyword 'intrusion detection system'

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar | Mohan K [18]

Share this Article

Downloads: 2 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, United States of America, Volume 13 Issue 4, April 2024

Pages: 285 - 288

Anomaly Detection of Financial Data using Machine Learning

Khirod Chandra Panda [3]

Share this Article
Top