CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

An Effectual and Secure Approach for the Detection and Efficient Searching of Network Intrusion Detection System (NIDS)

by Lekhraj Mehra, Mukesh Kumar Gupta, Monika Bhatt Guruji
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 108 - Number 15
Year of Publication: 2014
Authors: Lekhraj Mehra, Mukesh Kumar Gupta, Monika Bhatt Guruji
10.5120/18990-0442

Lekhraj Mehra, Mukesh Kumar Gupta, Monika Bhatt Guruji . An Effectual and Secure Approach for the Detection and Efficient Searching of Network Intrusion Detection System (NIDS). International Journal of Computer Applications. 108, 15 ( December 2014), 37-41. DOI=10.5120/18990-0442

@article{ 10.5120/18990-0442,
author = { Lekhraj Mehra, Mukesh Kumar Gupta, Monika Bhatt Guruji },
title = { An Effectual and Secure Approach for the Detection and Efficient Searching of Network Intrusion Detection System (NIDS) },
journal = { International Journal of Computer Applications },
issue_date = { December 2014 },
volume = { 108 },
number = { 15 },
month = { December },
year = { 2014 },
issn = { 0975-8887 },
pages = { 37-41 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume108/number15/18990-0442/ },
doi = { 10.5120/18990-0442 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:43:06.116638+05:30
%A Lekhraj Mehra
%A Mukesh Kumar Gupta
%A Monika Bhatt Guruji
%T An Effectual and Secure Approach for the Detection and Efficient Searching of Network Intrusion Detection System (NIDS)
%J International Journal of Computer Applications
%@ 0975-8887
%V 108
%N 15
%P 37-41
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The concept behind this particular aspect lies on the fact to determine and customize the simplicity and the most basic scenario. The basicity lies on the fact that we have been using the concept of Data Mining and even the algorithms are included that merely includes the efficiency of NIDS that is Network Intrusion Detection System. We have seen a lot of aspects and different concepts being used till this time with different methodologies and functionalities and even used and worked on different technologies. In this we have the major consideration that revolves over and around the algorithm and an emphasis on the technology of Data Mining with software concept of Java eclipse and have tried to improve the working functionality more efficient. The problem statement comprises of two objectives one is to improve the detection rate and false alarm rate of NIDS uses classification And ensemble technique and the second objective is to improve search efficiency of a NIDS by using association rule mining technique.

References
  1. Jiawei Han, Micheline Kamber, Jian Pei, "Data Mining: Concepts and Techniques: Concepts and Techniques", ISBN 978-0-12-381479-1, Elsevier, 2011.
  2. Rafeeq Ur Rehman, "Intrusion Detection Systems with Snort: Advanced IDS Techniques Using Snort, Apache, Prentice Hall Professional, 2003.
  3. Manthira Moorthy S and Rajeshwari M, "Virtual Host based Intrusion Detection System for Cloud", International Journal of Engineering and Technology, Vol 5 No 6, ISSN 0975-4024, 2014
  4. S. Shidore and V. K. Bhusari, "Evasion of Network Intrusion Detection System Using functional Framework", International Journal of Application or Innovation in Engineering & Management, Volume 3, Issue 6, ISSN 2319 – 4847, 2014.
  5. Mostaque Md. Morshedur Hassan, "Network Intrusion Detection System Using Genetic Algorithm and Fuzzy Logic", International Journal of Innovative Research in Computer and Communication Engineering, Vol. 1, Issue 7, September 2013.
  6. Subaira. A. S, Anitha. P, "A Survey: Network Intrusion Detection System based on Data Mining Techniques", International Journal of Computer Science and Mobile Computing Vol. 2 Issue. 10, pg. 145-153, 2013.
  7. Akansha Parashar and Praneet Saurabh, "A Novel Approach for Intrusion Detection to improve the detection rate using Artificial Immune system and Neural Network Technique", People's Journal of Science & Technology, Vol. 2 (1),ISSN 2249 5487, 2012
  8. Muamer N. Mohammad, Norrozila Sulaiman and Emad T. Khalaf, "A Novel Local Network Intrusion Detection System Based on Support Vector Machine", Journal of Computer Science, 7 (10) 1560-1564, ISSN 1549-3636, 2011.
  9. Mohammad Sazzadul Hoque, Md. Abdul Mukit and Md. Abu Naser Bikas, "An Implementation of Intrusion Detection System Using Genetic Algorithm", International Journal of Network Security & Its Applications, Vol. 4, No. 2, 2012.
  10. S. K. Wagh, M. S. Bhalerao, A. M. Pathan, J. S. Bhole and S. L. Pingale, "To Implement an Effective Real-Time Network Intrusion Detection System to Reduce False Alarm Rate and Improve Efficiency, Using Machine Learning Techniques", International Journal of Researchers, Scientists and Developers Vol. 1 No. 1 , ISSN 2347-3649, 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Data Mining NIDS Apriori Algorithm.