Performance Evaluation of PCA Filter In Clustered Based Intrusion Detection System

The study, analysis and exploration of recent development of data mining applications such as classification and clustering is one of the needs for machine learning algorithms to be applied to large scale data will lead to acquire the direction of future research. It would be future demand in IDS for detecting the intrusions in mobile network. This paper presents the comparison of different clustering techniques. Also focus on the effect of Principal Component Analysis filter on these clustered based methods.The aim of this paper is to investigate the performance of different clustering methods for a set of large data. The algorithms are tested on intrusion detection data set. A fundamental review on the selected clustering techniques is presented for introduction purposes. The KDD data set is used for this purpose. Subsequently, clustering technique that has the potential to significantly improve the conventional methods will be suggested for the use in intrusion detection in mobile network data.

[1]  Li Bo,et al.  The Research of Intrusion Detection Model Based on Clustering Analysis , 2009, 2009 International Conference on Computer and Communications Security.

[2]  Manas Ranjan Patra,et al.  A Novel Classification via Clustering Method for Anomaly Based Network Intrusion Detection System , 2009 .

[3]  Yi Lu,et al.  Research on Network anomaly Detection Based on Clustering and Classifier , 2006, 2006 International Conference on Computational Intelligence and Security.

[4]  Satinder Singh,et al.  Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters , 2005, ACSC.

[5]  Yin Shaohong,et al.  Research and improvement of clustering algorithm in data mining , 2010, 2010 2nd International Conference on Signal Processing Systems.

[6]  Meng Jianliang,et al.  The Application on Intrusion Detection Based on K-means Cluster Algorithm , 2009, 2009 International Forum on Information Technology and Applications.

[7]  Wenjun Zeng,et al.  A New Data-Mining Based Approach for Network Intrusion Detection , 2009, 2009 Seventh Annual Communication Networks and Services Research Conference.

[8]  S. S. Sherekar,et al.  Machine Learning Approaches for Detecting Intrusions in Network System , 2012 .

[9]  Christopher Leckie,et al.  Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters , 2005, ACSC.

[10]  Samta Gajbhiye,et al.  A Comparative Performance Analysis of Clustering Algorithms , 2012 .

[11]  Liu Hui,et al.  Research Intrusion Detection Techniques from the Perspective of Machine Learning , 2010, 2010 Second International Conference on Multimedia and Information Technology.

[12]  Shuang Li,et al.  Research on algorithm of association rules in Distributed Database System , 2010, 2010 2nd International Asia Conference on Informatics in Control, Automation and Robotics (CAR 2010).

[13]  S. Revathi,et al.  Performance Comparison of Various Clustering Algorithm , 2013 .