CFP last date
20 June 2024
Reseach Article

A Hybrid Data Mining Model for Intrusion Detection

by Mahreen Nasir
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 183 - Number 16
Year of Publication: 2021
Authors: Mahreen Nasir

Mahreen Nasir . A Hybrid Data Mining Model for Intrusion Detection. International Journal of Computer Applications. 183, 16 ( Jul 2021), 14-19. DOI=10.5120/ijca2021921489

@article{ 10.5120/ijca2021921489,
author = { Mahreen Nasir },
title = { A Hybrid Data Mining Model for Intrusion Detection },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2021 },
volume = { 183 },
number = { 16 },
month = { Jul },
year = { 2021 },
issn = { 0975-8887 },
pages = { 14-19 },
numpages = {9},
url = { },
doi = { 10.5120/ijca2021921489 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-07T01:16:58.084143+05:30
%A Mahreen Nasir
%T A Hybrid Data Mining Model for Intrusion Detection
%J International Journal of Computer Applications
%@ 0975-8887
%V 183
%N 16
%P 14-19
%D 2021
%I Foundation of Computer Science (FCS), NY, USA

Network intrusion detection requires analysis of network data streams for identification of possible attacks. An Intrusion Detection System (IDS) is used to analyse such attacks and prevent future attacks. Main categories of IDS are anomaly detection and misuse detection. The limitation of anomaly based detection is high false positive rate whereas misuse detection based systems can only deal with known attack types. To address these, the main contribution of this paper is to propose a framework using hybrid approach based on clustering and classification methods for Intrusion Detection (CCID).

  1. Monowar H Bhuyan, Dhruba Kumar Bhattacharyya, and Jugal K Kalita. \Network anomaly detection: methods, systems and tools". In: Ieee communications surveys & tutorials 16.1 (2014), pp. 303-336.
  2. Misty Blowers and Jonathan Williams. \Machine learning applied to cyber operations". In: Network science and cybersecurity. Springer, 2014,pp. 155-175.
  3. Richard O Duda, Peter E Hart, and David G Stork. Pattern classication.John Wiley & Sons, 2012.
  4. Farah Jemili, Montaceur Zaghdoud, and Mohamed Ben Ahmed. “A Framework for an Adaptive Intrusion Detection System using Bayesian Network." In: ISI. 2007, pp. 66-70.
  5. Finn V. Jensen. Bayesian Networks and Decision Graphs. Berlin, Heidelberg: Springer-Verlag, 2001. isbn: 0387952594.
  6. Suleman Khan. Network forensics Review, taxonomy, and open challenges". en. In: Journal of Network and Computer Applications (2016),p. 22.
  7. Kingsly Leung and Christopher Leckie. “Unsupervised anomaly detection in network intrusion detection using clusters". In: Proceedings of the Twenty-eighth Australasian conference on Computer Science-Volume 38.Australian Computer Society, Inc. 2005, pp. 333-342.
  8. Yihua Liao and V Rao Vemuri. “Use of k-nearest neighbor classifier for intrusion detection". In: Computers & security 21.5 (2002), pp. 439-448.
  9. Safaa O Al-mamory and Firas S Jassim. “Evaluation of different data mining algorithms with KDD CUP 99 Data Set". In: Journal of University of Babylon 21.8 (2013), pp. 2663-2681.
  10. Karlton Sequeira and Mohammed Zaki. \ADMIT: anomaly-based data mining for intrusions". In: Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining. ACM. 2002, pp. 386-395.
  11. Richard Zuech, Taghi M Khoshgoftaar, and Randall Wald. “Intrusion detection and Big Heterogeneous Data: a Survey". en. In: (2015), p. 41.
  12. Salo, Fadi, et al. "Data mining techniques in intrusion detection systems: A systematic literature review." IEEE Access 6 (2018): 56046-56058.
  13. Agrawal, Diptee, and Chetan Agrawal. "A Review on Various Methods of Intrusion Detection System." Computer Engineering and Intelligent Systems 11.1 (2020).
  14. KDD Cup 1999, [online] Available: (October, 2007)
  15. Wang, Wei, Xiaohong Guan, and Xiangliang Zhang. "Processing of massive audit data streams for real-time anomaly intrusion detection." Computer communications 31.1 (2008): 58-72.
Index Terms

Computer Science
Information Sciences


Intrusion Detection Classification Clustering Data Mining