Usage of data mining techniques for analyzing network intrusions

This paper presents the results of the analysis of the network intrusion detection systems using data mining techniques and anomaly detection. Anomaly detection technique is present for a while in the area of data mining. Previous papers that implement data mining techniques to detect anomaly attacks actually use well-known techniques such as classification or clustering. Anomaly detection technique combines all these techniques. They are also facing problem on the fact that many of the attacks do not have some kind of signature on network and transport layer, so it is not easy to train models for these type of attacks. Network dataset that was used in this paper is DARPA 1998 dataset created in MIT Lincoln Laboratory and is used worldwide for the network testing purposes.

[1]  Venu Govindaraju,et al.  Data mining for intrusion detection: techniques, applications and systems , 2004, Proceedings. 20th International Conference on Data Engineering.

[2]  Marco Ramilli,et al.  Peer-to-Peer Data Mining Classi ers for Decentralized Detection of Network Attacks , 2013, ADC.

[3]  S. K. Sharma,et al.  An improved network intrusion detection technique based on k-means clustering via Naïve bayes classification , 2012, IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012).

[4]  Sushil Jajodia,et al.  Detecting Novel Network Intrusions Using Bayes Estimators , 2001, SDM.

[5]  R.K. Cunningham,et al.  Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.

[6]  Leonid Portnoy,et al.  Intrusion detection with unlabeled data using clustering , 2000 .

[7]  LiaoYihua Use of K-Nearest Neighbor classifier for intrusion detection11An earlier version of this paper is to appear in the Proceedings of the 11th USENIX Security Symposium, San Francisco, CA, August 2002 , 2002 .

[8]  V. Rao Vemuri,et al.  Use of K-Nearest Neighbor classifier for intrusion detection , 2002, Comput. Secur..

[9]  Vineet Richariya,et al.  Anomaly Detection in Network using , 2012 .

[10]  Mennatallah Amer,et al.  Comparison of Unsupervised Anomaly Detection Techniques Bachelor Thesis , 2011 .

[11]  Kijoon Chae,et al.  Attack Classification Based on Data Mining Technique and Its Application for Reliable Medical Sensor Communication , 2009, Int. J. Comput. Sci. Appl..

[12]  Jaideep Srivastava,et al.  Detection and Summarization of Novel Network Attacks Using Data Mining , 2003 .