CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Comparing the Result of KDD Cup 1999 Data by using K-mean Algorithm and make Density based Cluster in Intrusion Detection System by Removing the Count Attribute

by Pratik Jain, Divyansh Kumrawat
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 175 - Number 16
Year of Publication: 2020
Authors: Pratik Jain, Divyansh Kumrawat
10.5120/ijca2020920661

Pratik Jain, Divyansh Kumrawat . Comparing the Result of KDD Cup 1999 Data by using K-mean Algorithm and make Density based Cluster in Intrusion Detection System by Removing the Count Attribute. International Journal of Computer Applications. 175, 16 ( Sep 2020), 21-26. DOI=10.5120/ijca2020920661

@article{ 10.5120/ijca2020920661,
author = { Pratik Jain, Divyansh Kumrawat },
title = { Comparing the Result of KDD Cup 1999 Data by using K-mean Algorithm and make Density based Cluster in Intrusion Detection System by Removing the Count Attribute },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2020 },
volume = { 175 },
number = { 16 },
month = { Sep },
year = { 2020 },
issn = { 0975-8887 },
pages = { 21-26 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume175/number16/31536-2020920661/ },
doi = { 10.5120/ijca2020920661 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:25:12.272940+05:30
%A Pratik Jain
%A Divyansh Kumrawat
%T Comparing the Result of KDD Cup 1999 Data by using K-mean Algorithm and make Density based Cluster in Intrusion Detection System by Removing the Count Attribute
%J International Journal of Computer Applications
%@ 0975-8887
%V 175
%N 16
%P 21-26
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

An IDS monitors network traffic searching for suspicious activity and known threats, sending up to alerts when it finds such items. In the recent avocation, Intrusion detection as a magnificence still remains censorial in cyber safety. But maybe not as a lasting resolution. To understand intrusion detection firstly understand what is intrusion. Cambridge dictionary defines an intrusion as "an occasion when someone goes into a place or situation where they are not wanted or expected to be". For the purpose of this article, here it defines intrusion as any un-possessed system or network festivity on one (or more) computer(s) or network(s). This is an illustration of a lawful user of a system trying to intensify his privileges to gain greater entrance to the system that he is currently entrusted, or the same user trying to connect to an unauthorized remote port of a server. These are the intrusions that can engender from the outside world, a aggrieved ex-employee who was fired lately, or from your faithful staff. In this clause, the mediocre data is discovered as invasion when the case is false positive. Here they are focusing on this problem with an illustration & offering one solution for the same problem. The KDD CUP 1999 data set is used. In the outcome of this experiment it can be seen that if a class has higher number of counts then this class is opined as an anomaly class. But it will be count as anomaly if the true person is passing the threshold value. One solution is proposed to detect the true person and to remove false positive.

References
  1. V. Chandola,A.Banerjee,V.Kumar, “Anomaly detection as a survey” ACM Comput. Surv.41(3)(2009)15:1–15:58.
  2. Francesco Mercaldo, “Identification of anomalies in processes of database alteration” IEEE 2013.
  3. Dorothy E. Denning. “An Intrusion- Detection Model” 1986 IEEE Computer Society Symposium on Research in Security and Privacy, pp 118-31.
  4. S. K. Chaturvedi1 , Prof. Vineet R. , Prof. Nirupama T. “Anomaly Detection in Network using Data mining Techniques” International Journal ISSN 2250-2459 Volume 2, Issue 5, May 2012.
  5. UgoFiore, Francesco, Aniello “Network anomaly detection with the restricted Boltzmann machine” Neurocomputing 122 (2013) 13–23.
  6. T. Bhavani et al., “Data Mining for Security Applications,” Proceedings of the 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing Volume 02, IEEE Computer Society, 2008.
  7. Shih-Wei Lina, Kuo-Ching Yingb, Chou-Yuan Leec, Zne-Jung Leed “An intelligent algorithm with feature selection and decision rules applied toanomaly detection” Elsevier 2011.
  8. Bhavani Thuraisingham “Data Mining for Malicious Code Detection and Security Applications” 2009 IEEE/WIC/ACM 2009.
  9. Shu Wu, Member, and Shengrui Wang “Information-Theoretic Outlier Detection for Large-Scale Categorical Data” VOL. 25, NO. 3, MARCH 2013.
  10. Bharat singh,Nidhi Kushwaha and OP vyas “Exploiting Anomaly Detections for high Dimensional data using Descriptive Approach of Data mining” IEEE(ICCT) 2013.
  11. M. Xue , C. Zhu, "Applied Research on Data Mining Algorithm in Network Intrusion Detection," jcai , pp.275-277, 2009 International Joint Conference Artificial Intelligence, 2009.
  12. Kapil Wankhade, Mrudula Gudadhe, Prakash Prasad, “A New Data Mining Based network Intrusion Detection Model”, In Proceedings of ICCCT 2010, IEEE, 2010, pp.731-735.
  13. Abdul Samad bin Haji Ismail “A Novel Method for Unsupervised Anomaly Detection using Unlabeled Data” IEEE 2008.
  14. Jonathan J, Davis, Andrew J. Clark “Data preprocessing for anomaly based network intrusion detection: A review” Elsevier 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Data mining Anomaly Detection System (ADS) K-Means Ensemble Detection rate False alarm rate false positive Clustering