CFP last date
20 May 2024
Reseach Article

Attribute Reduction based Hybrid Anomaly Intrusion Detection using K-Means and SVM Classifier

by Ujwala Ravale, Nilesh Marathe, Puja Padiya
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 82 - Number 15
Year of Publication: 2013
Authors: Ujwala Ravale, Nilesh Marathe, Puja Padiya
10.5120/14242-2448

Ujwala Ravale, Nilesh Marathe, Puja Padiya . Attribute Reduction based Hybrid Anomaly Intrusion Detection using K-Means and SVM Classifier. International Journal of Computer Applications. 82, 15 ( November 2013), 32-35. DOI=10.5120/14242-2448

@article{ 10.5120/14242-2448,
author = { Ujwala Ravale, Nilesh Marathe, Puja Padiya },
title = { Attribute Reduction based Hybrid Anomaly Intrusion Detection using K-Means and SVM Classifier },
journal = { International Journal of Computer Applications },
issue_date = { November 2013 },
volume = { 82 },
number = { 15 },
month = { November },
year = { 2013 },
issn = { 0975-8887 },
pages = { 32-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume82/number15/14242-2448/ },
doi = { 10.5120/14242-2448 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:57:51.485172+05:30
%A Ujwala Ravale
%A Nilesh Marathe
%A Puja Padiya
%T Attribute Reduction based Hybrid Anomaly Intrusion Detection using K-Means and SVM Classifier
%J International Journal of Computer Applications
%@ 0975-8887
%V 82
%N 15
%P 32-35
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In Information Security, intrusion detection is the act of detecting actions that attempt to compromise the confidentiality, integrity or availability of a resource. One of the primary challenges to intrusion detection is the problem of misjudgment, misdetection and lack of real time response to the attack. Various data mining techniques such as clustering, classification and association rule discovery are being used for intrusion detection. The proposed hybrid technique combines data mining approaches like K Means clustering algorithm and Support Vector Machine classification module. The main purpose of proposed technique is to decrease the number of attributes associated with each data point. So that, the proposed technique can perform better in terms of Detection Rate and Accuracy when applied to KDD’99 Data Set.

References
  1. Z. Muda, W. Yassin, M.N. Sulaiman, N.I. Udzir, “Intrusion Detection based on K-Means Clustering and Naïve Bayes Classification”, 2011 7th International Conference on IT in Asia (CITA).
  2. Meng Jianliang Shang Haikun Bian Ling, “The Application on Intrusion Detection Based on K-means Cluster Algorithm”, 2009 IEEE International Forum on Information Technology and Application.
  3. Sanjay Kumar Sharma, Pankaj Pande, Susheel Kumar Tiwari and Mahendra Singh Sisodia, “An Improved Network Intrusion Detection Technique based on k-Means Clustering via NaIve Bayes Classification”, IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012) March 30, 31, 2012.
  4. Deepthy K Denatious & Anita John, “Survey on Data Mining Techniques to Enhance Intrusion Detection”, 2012 International Conference on Computer Communication and Informatics (ICCCI -2012), Jan. 10 – 12, 2012, Coimbatore, INDIA.
  5. Roshan Chitrakar and Huang Chuanhe, “Anomaly Detection using Support Vector Machine Classification with k-Medoids Clustering”, In IEEE computer society symposium on research in security and privacy,2012.
  6. Preecha Somwang and Woraphon Lilakiatsakun, “Computer Network Security Based On Support Vector Machine Approach”,11th International Conference on Control, Automation and Systems Oct. 26-29, 2011 in KINTEX, Gyeonggi-do, Korea.
  7. E.Raju, K.Sravanthi, “Network intrusion detection using Support Vector Machines”, International Journal of Computer Science and Management Research Vol 2 Issue 1 January 2013 ISSN 2278-733X.
  8. Shyam Sunder, Balaram, P.Pavan kumar, “SVM & Decision Trees for High Attack Detection Ratio”, IJCAE, Vol.3 Issue 3, November 2012,37 – 25.
  9. Jingwen Tian, Meijuan Gao, Fan Zhang, “Network Intrusion Detection Method Based on Radial Basic Function Neural Network”, Computer Engineering and Design, vol. 29,no. 12, pp. 3022-3025, 2009 IEEE.
  10. Yogita B. Bhavsar1, Kalyani C.Waghmare, “Intrusion Detection System Using Data Mining Technique: Support Vector Machine”, International Journal of Emerging Technology and Advanced Engineering, Volume 3, Issue 3, March 2013.
  11. Mahbod Tavallaee, Ebrahim Bagheri, Wei Lu, and Ali A. Ghorbani, “A Detailed Analysis of the KDD CUP 99 Data Set”, Proceedings of the 2009 IEEE symposium on Computational Intelligence in Security and Defense Applications (CISDA 2009).
  12. Kazem Qazanfari, Minoo Sadat Mirpouryan, Hossein Gharaee, “A Novel Hybrid Anomaly Based Intrusion Detection Method”, 6th International Symposium on Telecommunications (IST'2012).
  13. Hari Om, Aritra Kundu, “A Hybrid System for Reducing the False Alarm Rate of Anomaly Intrusion Detection System”, 1st Int’l Conf. on Recent Advances in Information Technology (RAIT) 2012 IEEE.
  14. Jingwen Tian, Meijuan Gao, Fan Zhang, “Network Intrusion Detection Method Based on Radial Basic Function Neural Network”, Computer Engineering and Design, vol. 29,no. 12, pp. 3022-3025, 2009 IEEE.
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion detection system K Means clustering Support Vector Machine KDD’99 Data Set.