CFP last date
20 May 2024
Reseach Article

Intrusion Detection based on K-Means Clustering and Ant Colony Optimization: A Survey

by Chetan Gupta, Amit Sinhal, Rachana Kamble
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 79 - Number 6
Year of Publication: 2013
Authors: Chetan Gupta, Amit Sinhal, Rachana Kamble
10.5120/13747-1555

Chetan Gupta, Amit Sinhal, Rachana Kamble . Intrusion Detection based on K-Means Clustering and Ant Colony Optimization: A Survey. International Journal of Computer Applications. 79, 6 ( October 2013), 30-35. DOI=10.5120/13747-1555

@article{ 10.5120/13747-1555,
author = { Chetan Gupta, Amit Sinhal, Rachana Kamble },
title = { Intrusion Detection based on K-Means Clustering and Ant Colony Optimization: A Survey },
journal = { International Journal of Computer Applications },
issue_date = { October 2013 },
volume = { 79 },
number = { 6 },
month = { October },
year = { 2013 },
issn = { 0975-8887 },
pages = { 30-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume79/number6/13747-1555/ },
doi = { 10.5120/13747-1555 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:52:19.963710+05:30
%A Chetan Gupta
%A Amit Sinhal
%A Rachana Kamble
%T Intrusion Detection based on K-Means Clustering and Ant Colony Optimization: A Survey
%J International Journal of Computer Applications
%@ 0975-8887
%V 79
%N 6
%P 30-35
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Identifying intrusions is the process called intrusion detection. In simple manner the act of comprising a system is called intrusion. An intrusion detection system (IDS) inspects all inbound and outbound activity and identifies suspicious patterns that may indicate a system attack from someone attempting to compromise a system. If we think of the current scenario then several new intrusion that cannot be prevented by the previous algorithm, IDS is introduced to detect possible violations of a security policy by monitoring system activities and response in all times for betterment. If we uncover the counterfeit marque in a circumspect bulletin climate, an affirmation seat is initiated to prophesy or lessen the damage to the system. As a result it is a keen intrigue. In this dissertation we survey several aspects with the traditional techniques of intrusion detection we elaborate our proposed work. We also come with some future suggestions, which can provide a better way in this direction. For the above survey we also discuss K-Means and Ant Colony optimization (ACO).

References
  1. Meng Jianliang,Shang Haikun,Bian Ling," The Application on Intrusion Detection Based on K-means Cluster Algorithm", International Forum on Information Technology and Applications, 2009.
  2. Lundin, E. and Jonsson, E. "Survey of research in the intrusion detection area", Technical Report, Department of Computer Engineering, Chalmers University of Technology, Göteborg, Sweden. January 2002.
  3. Li Tian,Wang Jianwen," Research on Network Intrusion Detection System Based on Improved K-means Clustering Algorithm", International Forum on Computer Science-Technology and Applications, 2009.
  4. S. Devaraju, S. Ramakrishnan:,"Analysis of Intrusion Detection System Using Various Neural Network classifiers, IEEE 2011.
  5. Moriteru Ishida, Hiroki Takakura and Yasuo Okabe," High-Performance Intrusion Detection Using OptiGrid Clustering and Grid-based Labelling", IEEE/IPSJ International Symposium on Applications and the Internet, 2011.
  6. Prakash Ranganathan, Juan Li, Kendall Nygard, "A Multiagent System using Associate Rule Mining (ARM), a collaborative filtering approach", IEEE 2010, pp- v7 574- 578.
  7. Prof Thivakaran. T. K, Rajesh. N, Yamuna. P, Prem Kumar. G, "Probable Sequence Determination Using Incremental Association Rule Mining And Transaction Clustering", IEEE 2009, pp 37-41.
  8. S. Goss, S. Aron, J. L. Deneubourg, and J. M. Pasteels. "Self-organized Shorcuts in the Argentine Ant. " Naturwissenschaften, 76:579–581, 1989.
  9. M. Dorigo, Gianni Di Caro, and Luca M. Gambardella. "Ant Algorithms for Discrete Optimization. " Technical Report Tech. Rep. IRIDIA/98-10, IRIDIA, Universite Libre de Bruxelles, Brussels, Belgium, 1998.
  10. M. Dorigo and M. Maniezzo and A. Colorni. "The Ant Systems: An Autocatalytic Optimizing Process. " Revised 91-016, Dept. of Electronica, Milan Polytechnic, 1991.
  11. G. Schaffrath,R. Sadre,C. Morariu,A. Pras and B. Stiller, "An Overview of IP Flow-Based Intrusion Detection", Communications Surveys & Tutorials, IEEE 2010.
  12. Zhengjie Li, Yongzhong Li , Lei Xu," Anomaly Intrusion Detection Method Based on K-means Clustering Algorithm with Particle Swarm Optimization", International Conference of Information Technology, Computer Engineering and Management Sciences,2011.
  13. LI Yin–huan, "Design of Intrusion Detection Model Based on Data Mining Technology", International Conference on Industrial Control and Electronics Engineering, 2012.
  14. P. Prasenna, R. Krishna Kumar, A. V. T Raghav Ramana and A. Devanbu "Network Programming And Mining Classifier For Intrusion Detection Using Probability Classification", Pattern Recognition, Informatics and Medical Engineering, March 21-23, 2012.
  15. LI Han,"Using a Dynamic K-means Algorithm to Detect Anomaly Activities", Seventh International Conference on Computational Intelligence and Security, 2011.
  16. Z. Muda, W. Yassin, M. N. Sulaiman, N. I. Udzir," Intrusion Detection based on K-Means Clustering and Naïve Bayes Classification", 7th International Conference on IT in Asia (CITA), 2011.
  17. C. F. Tsai, and C. Y Lin, "A triangle area-based nearest neighbors approach to intrusion detection," Pattern Recognition, 2010, 43(1):222-229.
  18. C. Xiang, P. C. Yong, and L. S. Meng, "Design of multiple level hybrid classifier for intrusion detection system using Bayesian clustering and decision tree," Pattern Recognition Letters, 2008, 29: 918-924.
  19. Pragati Shrivastava, Hitesh Gupta," A Review of Density-Based clustering in Spatial Data", International Journal of Advanced Computer Research (IJACR), Volume-2 Number-3 Issue-5 September-2012.
  20. Anshuman Singh Sadh, Nitin Shukla," Association Rules Optimization: A Survey", International Journal of Advanced Computer Research (IJACR), Volume-3 Number-1 Issue-9 March-2013.
  21. Mr. Sachin sohra, Mr. Narendra Rathod," An Improved Single and Multiple association Approach for Mining Medical Databases", International Journal of Advanced Computer Research (IJACR) Volume 2 Number 2 June 2012.
  22. Manish Somani, Roshni Dubey," Design of Intrusion Detection Model Based on FP-Growth and Dynamic Rule Generation with Clustering", International Journal of Advanced Computer Research (IJACR) Volume-3 Number-2 Issue-10 June-2013.
  23. Shantakumar B. Patil, Dr. Y. S. Kumaraswamy," Extraction of Significant Patterns from Heart Disease Warehouses for Heart Attack Prediction", IJCSNS International Journal of Computer Science and Network Security, VOL. 9 No. 2, February 2009.
  24. Parag Deoskar, Dr. Divakar Singh, Dr. Anju Singh," Mining Lung Cancer Data and Other Diseases Data Using Data Mining Techniques: A Survey", International Journal of Computer Engineering and Technology (IJCET), Volume 4, Issue 2, March – April (2013).
  25. Anshuman Singh Sadh, Nitin Shukla," Apriori and Ant Colony Optimization of Association Rules", International Journal of Advanced Computer Research (IJACR),Volume-3 Number-2 Issue-10 June-2013.
  26. Alexander O. Tarakanov, Sergei V. Kvachev, Alexander V. Sukhorukov ," A Formal Immune Network and Its Implementation for On-line Intrusion Detection", Lecture Notes in Computer Science Volume 3685, 2005, pp 394-405.
  27. Foster Provost," Machine Learning from Imbalanced Data Sets 101", AAAI Technical Report WS-00-05. Compilation copyright © 2000, AAAI (www. aaai. org).
Index Terms

Computer Science
Information Sciences

Keywords

IDS K-Means ACO Suspicious Patterns