CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Intrusion Detection with Hidden Markov Model and WEKA Tool

by Ashish T. Bhole, Archana I. Patil
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 85 - Number 13
Year of Publication: 2014
Authors: Ashish T. Bhole, Archana I. Patil
10.5120/14902-3394

Ashish T. Bhole, Archana I. Patil . Intrusion Detection with Hidden Markov Model and WEKA Tool. International Journal of Computer Applications. 85, 13 ( January 2014), 27-30. DOI=10.5120/14902-3394

@article{ 10.5120/14902-3394,
author = { Ashish T. Bhole, Archana I. Patil },
title = { Intrusion Detection with Hidden Markov Model and WEKA Tool },
journal = { International Journal of Computer Applications },
issue_date = { January 2014 },
volume = { 85 },
number = { 13 },
month = { January },
year = { 2014 },
issn = { 0975-8887 },
pages = { 27-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume85/number13/14902-3394/ },
doi = { 10.5120/14902-3394 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:02:22.246414+05:30
%A Ashish T. Bhole
%A Archana I. Patil
%T Intrusion Detection with Hidden Markov Model and WEKA Tool
%J International Journal of Computer Applications
%@ 0975-8887
%V 85
%N 13
%P 27-30
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The internet has become a convenient way for people exchanging information and doing business over the internet. Uptil now, intrusion detection technique has been using either anomaly based or signature based detection technique. The hybrid technique gives advantages of both the techniques. Anomaly detection strategy is to suspect of what is considered an unusual activity for the subject (users, processes, etc. ) and carry on further investigation. This approach is particularly effective against novel (i. e. previously unknown) attacks. Signature based detection systems detect previously known attack in a timely and efficient way. The Hybrid technique gives better result than signature based or anomaly based technique alone.

References
  1. Kapil Kumar Gupta, Baikunth Nath, January –March 2010 Layered Approach Using Conditional Random Fields for Intrusion Detection.
  2. T. Abraham, 2008 IDDM: Intrusion Detection Using Data Mining Techniques.
  3. N. B. Amor, S. Benferhat, and Z. Elouedi, 2004 Naive Bayes vs. Decision Trees in Intrusion Detection Systems.
  4. https://blog. itu. dk/SPVCE2010/files/2010/11/wekatutorial. pdf , CMP: Data Mining and Statistics within the Health Services.
  5. Yusufovna, S. F,Oct 2008 Integrating Intrusion Detection System and Data Mining.
  6. Christopher Kruegel ,Darren Mutz William ,Robertson Fredrik Valeu , Reliable Software Group University of California , Bayesian Event Classi?cation for Intrusion Detection.
  7. SANS Institute InfoSec Reading Room , Understanding Intrusion Detection Systems.
  8. Ozalp Babaoglu , 2006 IDS:Intrusion Detection Systems.
  9. Y. Du, H. Wang, and Y. Pang , 2004 A Hidden Markov Models-Based Anomaly Intrusion Detection Method.
  10. L. Portnoy, E. Eskin, and S. Stolfo, 2001 Intrusion Detection with Unlabeled Data Using Clustering.
  11. Y. -S. Wu, B. Foo, Y. Mei, and S. Bagchi, 2003 Collaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDS .
  12. W. Lee and S. Stolfo, "Data Mining Approaches for Intrusion Detection," Proc. Seventh USENIX Security Symp. (Security '98),pp. 79-94, 1998.
  13. http://www. cse. sc. edu/research/isl/agentIDS. shtml,2010 Probabilistic Agent Based Intrusion Detection.
  14. Awodele, Oludele; Idowu, Sunday; Anjorin, Omotola; Joshua, Vincent J. , "A Multi-Layered Approach to the Design of Intelligent Intrusion Detection and Prevention System (IIDPS)", Academic journal article from Issues in Informing Science & Information Technology, Vol. 6. 2009
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion detection Layered Approach Hidden Markov Model Decision Trees Naive Bayes