CFP last date
20 May 2024
Reseach Article

A Unified Approach for Real Time Intrusion Detection using Intelligent Data Mining Techniques

Published on December 2011 by Naveen N C, Dr. R. Srinivasan, Dr. S. Natarajan
Network Security and Cryptography
Foundation of Computer Science USA
NSC - Number 3
December 2011
Authors: Naveen N C, Dr. R. Srinivasan, Dr. S. Natarajan
a2d43433-aea5-4658-b654-3d9ed6713e68

Naveen N C, Dr. R. Srinivasan, Dr. S. Natarajan . A Unified Approach for Real Time Intrusion Detection using Intelligent Data Mining Techniques. Network Security and Cryptography. NSC, 3 (December 2011), 13-17.

@article{
author = { Naveen N C, Dr. R. Srinivasan, Dr. S. Natarajan },
title = { A Unified Approach for Real Time Intrusion Detection using Intelligent Data Mining Techniques },
journal = { Network Security and Cryptography },
issue_date = { December 2011 },
volume = { NSC },
number = { 3 },
month = { December },
year = { 2011 },
issn = 0975-8887,
pages = { 13-17 },
numpages = 5,
url = { /specialissues/nsc/number3/4336-spe030t/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Network Security and Cryptography
%A Naveen N C
%A Dr. R. Srinivasan
%A Dr. S. Natarajan
%T A Unified Approach for Real Time Intrusion Detection using Intelligent Data Mining Techniques
%J Network Security and Cryptography
%@ 0975-8887
%V NSC
%N 3
%P 13-17
%D 2011
%I International Journal of Computer Applications
Abstract

In the recent days, there is a rapid increase in the usage of intelligent data mining approaches to predict intrusion in local area networks. In this paper, an approach for Intrusion Detection System (IDS) which embeds an expert system making data mining technique behave intelligently is proposed. Intrusion Detection System (IDS) is considered as a system integrated with intelligent subsystems, which completes the distributed solution procedure on the basis of exchanging large data and information. Any intelligent process self regulates and self-controls itself in the event of intrusion. The system however requires complete information of the intrusion mechanisms and generates appropriate decisions for preventing from further attacks. The combination of methods is intended to give better performance of IDS systems, and make the detection more effective. The result of the evaluation of the new design has produced a better output in terms of efficiency in detection and reduction of false alarm rate from the existing problems. In this paper we present improved architecture along with implementation details. A proper justification for claiming the proposed approach as a better method is also endorsed. The challenging research trends in the field of Data Mining involving Intrusion Detection methods is also discussed at the latter part of the paper.

References
  1. Huang G-B, Zhu Q-Y, Siew C-K (2004) Extreme learning machine: a new learning scheme of feedforward neural networks. In: Proceedings of international joint conference on neural networks (IJCNN2004), vol 2, Budapest, Hungary, 25–29 July 2004, pp 985–990
  2. Guang-Bin Huang_, Qin-Yu Zhu, Chee-Kheong Siew, Extreme learning machine: Theory and applications, 2006
  3. G.-B. Huang, Q.-Y. Zhu, C.-K. Siew, Real-time learning capability of neural networks, Technical Report ICIS/45/2003, School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore, April 2003
  4. Li K, Huang G-B, Ge SS (2010) Fast construction of single hidden layer feedforward networks. In: Rozenberg G, Back T, Kok JN (eds) Handbook of natural computing. Springer, Berlin, Mar 2010
  5. Dewan Md. Farid, Jerome Darmont, Nouria Harbi, Nguyen Huu Hoa, and Mohammad Zahidur Rahman, Adaptive Network Intrusion Detection Learning: Attribute Selection and Classification, World Academy of Science, Engineering and Technology 60 2009
  6. Dewan Md. Farid, Nouria Harbi, Emna Bahri, Mohammad Zahidur Rahman, Chowdhury Mofizur Rahman, Attacks Classification in Adaptive Intrusion Detection using Decision Tree, World Academy of Science, Engineering and Technology 63 2010
  7. Ahmad Ghodselahi, A Hybrid Support Vector Machine Ensemble Model for Credit Scoring, International Journal of Computer Applications (0975 – 8887) Volume 17– No.5, March 2011
  8. A.S. Sodiya, H.O.D. Longe and A.T. Akinwale, A new two-tiered strategy to intrusion detection. Information Management & Computer Security, 12 1 (2004), pp. 27–44.
  9. LI ZHUOWEI, A Framework For Systematic Design, Analysis And Evaluation Of Intrusion Detection Systems, A thesis submitted to the Nanyang Technological University, 2007
  10. Iftikhar Ahmad, Azween Abdullah and Abdullah Alghamdi, Towards the selection of best neural network system for intrusion detection, International Journal of the Physical Sciences Vol. 5(12), pp. 1830-1839, 4 October, 2010
  11. MuamerN. Mohammad, Norrozila Sulaiman, Osama Abdulkarim Muhsin, A novel intrusion detection system by using intelligent data mining in weka environment,WCIT 2010
  12. G.-B. Huang, H.A. Babri, Upper bounds on the number of hidden neurons in feedforward networks with arbitrary bounded nonlinear activation functions, IEEE Trans. Neural Networks 9 (1) (1998) 224–229.
  13. John F. Kolen Jordan B. Pollack, Back Propagation is Sensitive to Initial Conditions, Laboratory for Artificial Intelligence Research
  14. Chih-Wei Hsu, Chih-Chung Chang, and Chih-Jen Lin, A Practical Guide to Support Vector Classification, 2010
  15. Rosenblatt F (1962) Principles of neurodynamics: Perceptrons and the theory of brain mechanisms. Spartan Books, New York
  16. Lowe D (1989) Adaptive radial basis function nonlinearities and the problem of generalization. In: Proceedings of first IEEE international conference on artificial neural networks, pp 171–175.
Index Terms

Computer Science
Information Sciences

Keywords

Data Mining WEKA Neural Networks SLFN