An Overview of Intrusion Detection Based on Data Mining Techniques

Intrusion Detection System (IDS) is a vital component of any network in today's world of Internet. IDS are an effective way to detect different kinds of attacks in interconnected network. An effective Intrusion Detection System requires high accuracy and detection rate as well as low false alarm rate. Different Data Mining techniques such as clustering and classification are proving to be useful for analyzing and dealing with large amount of network traffic. This paper presents various data mining techniques applied on intrusion detection systems for the effective identification of both known and unknown patterns of attacks, to develop secure information systems.

[1]  A. John,et al.  Survey on data mining techniques to enhance intrusion detection , 2012, 2012 International Conference on Computer Communication and Informatics.

[2]  Hiroki Takakura,et al.  High-Performance Intrusion Detection Using OptiGrid Clustering and Grid-Based Labelling , 2011, 2011 IEEE/IPSJ International Symposium on Applications and the Internet.

[3]  Ali A. Ghorbani,et al.  Y-means: a clustering method for intrusion detection , 2003, CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436).

[4]  Li Han Using a Dynamic K-means Algorithm to Detect Anomaly Activities , 2011, 2011 Seventh International Conference on Computational Intelligence and Security.

[5]  Liu Hui,et al.  Research Intrusion Detection Techniques from the Perspective of Machine Learning , 2010, 2010 Second International Conference on Multimedia and Information Technology.

[6]  W. Yassin,et al.  Intrusion detection based on K-Means clustering and Naïve Bayes classification , 2011, 2011 7th International Conference on Information Technology in Asia.

[7]  Hari Om,et al.  A hybrid system for reducing the false alarm rate of anomaly intrusion detection system , 2012, 2012 1st International Conference on Recent Advances in Information Technology (RAIT).

[8]  Mrudula Gudadhe,et al.  A new data mining based network Intrusion Detection model , 2010, 2010 International Conference on Computer and Communication Technology (ICCCT).

[9]  Sufyan T. Faraj Al-Janabi,et al.  A Neural Network Based Anomaly Intrusion Detection System , 2011, 2011 Developments in E-systems Engineering.

[10]  Han Li Research and Implementation of an Anomaly Detection Model Based on Clustering Analysis , 2010, 2010 International Symposium on Intelligence Information Processing and Trusted Computing.

[11]  Wang Huai-bin,et al.  A Clustering Algorithm Use SOM and K-Means in Intrusion Detection , 2010, 2010 International Conference on E-Business and E-Government.

[12]  Xiaomin Wang,et al.  A Parallel Clustering Ensemble Algorithm for Intrusion Detection System , 2010, 2010 Ninth International Symposium on Distributed Computing and Applications to Business, Engineering and Science.

[13]  Erland Jonsson,et al.  Using active learning in intrusion detection , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..