CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Case Study: Stream Data Mining Classification

Published on December 2015 by Ketan Sanjay Desale, Roshani Ade
National Conference on Advances in Computing
Foundation of Computer Science USA
NCAC2015 - Number 2
December 2015
Authors: Ketan Sanjay Desale, Roshani Ade
5a3bdbc0-8801-4feb-bc9e-74cc2a2531cd

Ketan Sanjay Desale, Roshani Ade . A Case Study: Stream Data Mining Classification. National Conference on Advances in Computing. NCAC2015, 2 (December 2015), 1-4.

@article{
author = { Ketan Sanjay Desale, Roshani Ade },
title = { A Case Study: Stream Data Mining Classification },
journal = { National Conference on Advances in Computing },
issue_date = { December 2015 },
volume = { NCAC2015 },
number = { 2 },
month = { December },
year = { 2015 },
issn = 0975-8887,
pages = { 1-4 },
numpages = 4,
url = { /proceedings/ncac2015/number2/23361-5020/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Advances in Computing
%A Ketan Sanjay Desale
%A Roshani Ade
%T A Case Study: Stream Data Mining Classification
%J National Conference on Advances in Computing
%@ 0975-8887
%V NCAC2015
%N 2
%P 1-4
%D 2015
%I International Journal of Computer Applications
Abstract

Continuous and unending growth of data created so many challenges in data mining task. Data mining is extraction meaningful information i. e. knowledge from large datasets for the future decision making. The data which is continuously generating with changing values is known as streaming data. We face many problems with streaming data as we are unable to store it and process it. Network data is one of the best examples of streaming data. Intrusion Detection System (IDS) used to detect the malicious user to protect the network. System's safety in a network is a prime important factor. In this paper, we present comprehensive approach to improve performance of IDS by applying some classification techniques with streaming dataset. For the experiment purpose we created our own network dataset which shows significant accuracy in results after applying classifiers.

References
  1. Shabiashabir khan, M. A. Peer, S. M. K. Quadri, "Comparative Study of Streaming Data Mining techniques", International conference on computing for sustainable Global Development, 2014.
  2. C. Aggarwal, J. Han, J. Wang, P. S. Yu, "for Clustering Evolving DataStreams", Proc. 2003 Int. Conf. on Very Large DataBases, Berlin, Germany, Sept. 2003.
  3. Gaber, M, M. , Zaslavsky, A. , and Krishnaswamy,S. ," Towards an Adaptive Approach for Mining DataStreams in Resource Constrained Environments", theProceedings of Sixth International Conference on DataWarehousing and Knowledge Discovery IndustryTrack (DaWak 2004), Zaragoza, Spain, 30 August 3September, Lecture Notes in Computer Science (LNCS),Springer Verlag.
  4. P. Domingos and G. Hulten, "General Method for Scaling Up Machine Learning Algorithms and its Application to Clustering", Proceedings of theEighteenth International Conference on MachineLearning, 2001, Williamstown, MA, Morgan Kaufmann.
  5. K. S. Desale, Rohani Ade, "Genetic Algorithm based Feature Selection Approach for Effective Intrusion Detection System", 2015 International Conference on Computer Communication and Informatics (ICCCI - 2015), Jan. 08 10, 2015, Coimbatore, INDIA
  6. G. Dong, J. Han, L. V. S. Lakshmanan, J. Pei, H. Wang and P. S. Yu, "Online mining of changes from datastreams: Research problems and preliminary results", Proceedings of the 2003 ACM SIGMOD Workshop on Management and Processing of Data Streams. In cooperation with the 2003 ACMSIGMOD International Conference on Management of Data, San Diego, CA, June 8, 2003.
  7. Theodoros Lappas and Konstantinos Pelechrinis, "Data Mining Techniques for (Network) Intrusion Detection Systems".
  8. S. Muthukrishnan, "streams: algorithms and applications", Proceedings of the fourteenth annual ACMSIAM symposium on discrete algorithms. (2003).
  9. Muamer N. Mohammada, Norrozila Sulaimana, Osama Abdulkarim Muhsinb, "A Novel Intrusion Detection System by using Intelligent Data Mining in Weka Environment", Procedia Computer Science 3, 2011, pp. 1237 – 1242.
  10. Muamer N. Mohammada, Norrozila Sulaimana, Osama Abdulkarim Muhsinb, "A Novel Intrusion Detection System by using Intelligent Data Mining in Weka Environment", Procedia Computer Science 3, 2011, pp. 1237 – 1242.
  11. C. Aggarwal, J. Han, J. Wang, and P. S. Yu," A Framework for Projected Clustering of High Dimensional Data Streams", Proc. 2004 Int. Conf. onVery Large Data Bases, Toronto, Canada, 2004.
  12. B. Babcock, S. Babu, M. Datar, R. Motwani, and J. Widom," Models and issues in data stream systems", Proceedings of PODS, 2002.
  13. Albert Bifet , Geoff Holmes, Richard Kirkby , Bernhard Pfahringer, "MOA: Massive Online Analysis" Journal of Machine Learning Research 11 (2010) 1601-1604.
Index Terms

Computer Science
Information Sciences

Keywords

Data Mining Naive Bayes Hoeffding Tree Intrusion Detection System (ids)