CFP last date
20 May 2024
Reseach Article

A Review and Meta-Analysis for Efficient Intrusion Detection on KDD Dataset

by Nidhi Shrivastava, Shrish Dixit, Shiv Kumar Sahu
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 156 - Number 10
Year of Publication: 2016
Authors: Nidhi Shrivastava, Shrish Dixit, Shiv Kumar Sahu
10.5120/ijca2016912532

Nidhi Shrivastava, Shrish Dixit, Shiv Kumar Sahu . A Review and Meta-Analysis for Efficient Intrusion Detection on KDD Dataset. International Journal of Computer Applications. 156, 10 ( Dec 2016), 15-19. DOI=10.5120/ijca2016912532

@article{ 10.5120/ijca2016912532,
author = { Nidhi Shrivastava, Shrish Dixit, Shiv Kumar Sahu },
title = { A Review and Meta-Analysis for Efficient Intrusion Detection on KDD Dataset },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2016 },
volume = { 156 },
number = { 10 },
month = { Dec },
year = { 2016 },
issn = { 0975-8887 },
pages = { 15-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume156/number10/26744-2016912532/ },
doi = { 10.5120/ijca2016912532 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:02:14.228315+05:30
%A Nidhi Shrivastava
%A Shrish Dixit
%A Shiv Kumar Sahu
%T A Review and Meta-Analysis for Efficient Intrusion Detection on KDD Dataset
%J International Journal of Computer Applications
%@ 0975-8887
%V 156
%N 10
%P 15-19
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In any network based system and organization identifying the possible attacks is very crucial and important to perceive the data integrity and security. Researchers are working in this field and several works is in progress. Due to the immense use, frequently updating in the data structure and large number of intrusions nature variability there are lot of scope in this area in terms of intrusion detection and classification. The main aim of this paper is to explore the gaps in the previous techniques and find out the methodologies by which any kind of hybridization is possible which can be capable in improving the classification accuracy.

References
  1. Farhaoui Y. How to secure web servers by the intrusion prevention system (IPS)? International Journal of Advanced Computer Research. 2016 Mar 1; 6(23):65.
  2. Jianliang M, Haikun S, Ling B. The application on intrusion detection based on k-means cluster algorithm. InInformation Technology and Applications, 2009. IFITA'09. International Forum on 2009 May 15 (Vol. 1, pp. 150-152). IEEE.
  3. Kabiri P, Ghorbani AA. Research on Intrusion Detection and Response: A Survey. IJ Network Security. 2005 Sep; 1(2):84-102.
  4. Park HA. Secure chip based encrypted search protocol in mobile office environments. International Journal of Advanced Computer Research. 2016; 6(24):72-80.
  5. Tiwari R, Sinhal A. Block based text data partition with RC4 encryption for text data security. International Journal of Advanced Computer Research. 2016; 6(24):107-13.
  6. Tian L, Jianwen W. Research on network intrusion detection system based on improved k-means clustering algorithm. In Computer Science-Technology and Applications, 2009. IFCSTA'09. International Forum on 2009 Dec 25 (Vol. 1, pp. 76-79). IEEE.
  7. Devaraju S, Ramakrishnan S. Analysis of Intrusion Detection System Using Various Neural Network classifiers. IEEE 2011. 2011:1033-8.
  8. Conteh NY, Schmick PJ. Cybersecurity: risks, vulnerabilities and countermeasures to prevent social engineering attacks. International Journal of Advanced Computer Research. 2016 Mar 1; 6(23):31.
  9. Lee HY, Wang NJ. The implementation and investigation of securing web applications upon multi-platform for a single sign-on functionality. International Journal of Advanced Computer Research. 2016 Mar 1; 6(23):39.
  10. Ishida M, Takakura H, Okabe Y. High-performance intrusion detection using optigrid clustering and grid-based labelling. InApplications and the Internet (SAINT), 2011 IEEE/IPSJ 11th International Symposium on 2011 Jul 18 (pp. 11-19). IEEE.
  11. Brugger ST. Data mining methods for network intrusion detection. University of California at Davis. 2004 Jun 9.
  12. Lee W, Stolfo SJ. Data mining approaches for intrusion detection. In Usenix security 1998 Jan 26.
  13. Nalavade K, Meshram BB. Mining Association Rules to Evade Network Intrusion in Network Audit Data. International Journal of Advanced Computer Research. 2014 Jun 1;4(2):560.
  14. Naoum R, Aziz S, Alabsi F. An Enhancement of the Replacement Steady State Genetic Algorithm for Intrusion Detection. International Journal of Advanced Computer Research. 2014 Jun 1; 4(2):487.
  15. Lee W, Stolfo SJ, Mok KW. A data mining framework for building intrusion detection models. InSecurity and Privacy, 1999. Proceedings of the 1999 IEEE Symposium on 1999 (pp. 120-132). IEEE.
  16. Kumari S, Shrivastava M. A Study Paper on IDS Attack Classification Using Various Data Mining Techniques. International Journal of Advanced Computer Research. 2012; 2(3).
  17. Venkatesan R, Ganesan R, Selvakumar AA. A Comprehensive Study in Data Mining Frameworks for Intrusion Detection. International Journal of Advanced Computer Research (IJACR). 2012; 2: 29-34.
  18. Patel R, Bakhshi D, Arjariya T. Random Particle Swarm Optimization (RPSO) based Intrusion Detection System. International Journal of Advanced Technology and Engineering Exploration. 2015; 2(5): 60-66.
  19. Sperotto A, Schaffrath G, Sadre R, Morariu C, Pras A, Stiller B. An overview of IP flow-based intrusion detection. Communications Surveys & Tutorials, IEEE. 2010 Jul 1; 12(3):343-56.
  20. Han LI. Using a dynamic K-means algorithm to detect anomaly activities. In Computational Intelligence and Security (CIS), 2011 Seventh International Conference on 2011 Dec 3 (pp. 1049-1052). IEEE.
  21. Muda Z, Yassin W, Sulaiman MN, Udzir NI. Intrusion detection based on K-Means clustering and Naïve Bayes classification. In Information Technology in Asia (CITA 11), 2011 7th International Conference on 2011 Jul 12 (pp. 1-6). IEEE.
  22. Yin-huan LI. Design of intrusion detection model based on data mining technology. In2012 International Conference on Industrial Control and Electronics Engineering 2012 Aug 23.
  23. Prasenna P, RaghavRamana AV, Krishnakumar R, Devanbu A. Network programming and mining classifier for intrusion detection using probability classification. In Pattern Recognition, Informatics and Medical Engineering (PRIME), 2012 International Conference on 2012 Mar 21 (pp. 204-209). IEEE.
  24. Deshmukh DH, Ghorpade T, Padiya P. Intrusion detection system by improved preprocessing methods and Naïve Bayes classifier using NSL-KDD 99 Dataset. In Electronics and Communication Systems (ICECS), 2014 International Conference on 2014 Feb 13 (pp. 1-7). IEEE.
  25. Benaicha SE, Saoudi L, Guermeche B, Eddine S, Lounis O. Intrusion detection system using genetic algorithm. InScience and Information Conference (SAI), 2014 2014 Aug 27 (pp. 564-568). IEEE.
  26. Kiss I, Genge B, Haller P, Sebestyen G. Data clustering-based anomaly detection in industrial control systems. In Intelligent Computer Communication and Processing (ICCP), 2014 IEEE International Conference on 2014 Sep 4 (pp. 275-281). IEEE.
  27. Thaseen IS, Kumar CA. Intrusion detection model using fusion of PCA and optimized SVM. In Contemporary Computing and Informatics (IC3I), 2014 International Conference on 2014 Nov 27 (pp. 879-884). IEEE.
  28. Wagh SK, Kolhe SR. Effective intrusion detection system using semi-supervised learning. In Data Mining and Intelligent Computing (ICDMIC), 2014 International Conference on 2014 Sep 5 (pp. 1-5). IEEE.
  29. Masarat S, Taheri H, Sharifian S. A novel framework based on fuzzy ensemble of classifiers for intrusion detection systems. In Computer and Knowledge Engineering (ICCKE), 2014 4th International eConference on 2014 Oct 29 (pp. 165-170). IEEE.
  30. Bahl S, Sharma SK. Improving Classification Accuracy of Intrusion Detection System Using Feature Subset Selection. In Advanced Computing & Communication Technologies (ACCT), 2015 Fifth International Conference on 2015 Feb 21 (pp. 431-436). IEEE.
  31. Yan C. Intelligent Intrusion Detection Based on Soft Computing. In Measuring Technology and Mechatronics Automation (ICMTMA), 2015 Seventh International Conference on 2015 Jun 13 (pp. 577-580). IEEE.
  32. Haidar GA, Boustany C. High Perception Intrusion Detection Systems Using Neural Networks. Ninth International Conference on Complex, Intelligent, and Software Intensive Systems 2015 (pp. 497-501). IEEE.
  33. Dubey AK, Dubey AK, Agarwal V, Khandagre Y. Knowledge discovery with a subset-superset approach for Mining Heterogeneous Data with dynamic support. In Software Engineering (CONSEG), 2012 CSI Sixth International Conference on 2012 Sep 5 (pp. 1-6). IEEE.
  34. Hassan MM. Current studies on intrusion detection system, genetic algorithm and fuzzy logic. arXiv preprint arXiv:1304.3535. 2013 Apr 12.
  35. Kumar A, Maurya HC, Misra R. A Research Paper on Hybrid Intrusion Detection System. International Journal of Engineering and Advanced Technology (IJEAT). 2013;2: 2249-895.
  36. Masarat S, Taheri H, Sharifian S. A novel framework, based on fuzzy ensemble of classifiers for intrusion detection systems. InComputer and Knowledge Engineering (ICCKE), 2014 4th International eConference on 2014 Oct 29 (pp. 165-170). IEEE.
  37. Mukkamala S, Abraham AS. Designing Intrusion Detection Systems: Architectures, Challenges and Perspectives. Department of Computer Science, Oklahoma State University, USA. 2003.
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion detection techniques KDD DOS U2R R2L and probe