Author : Navita Datta 1
Date of Publication :18th April 2018
Abstract: This paper is based on a hybrid intrusion detection system by using integrating K-means clustering and J48 classification. Firstly, the features are selected using correlation based feature selection, so that the number of attributes participating in detection of attacks can only be taken into concern and then it reduces the dimensionality of the attributes using Principal Component and Analysis. This algorithm works on the NSL-KDD dataset which is an improved version of the previously used KDD CUP’99 Dataset. Then we apply K-Means clustering over the obtained attributes and lastly we apply J48 classification for its evaluation. The proposed work has been fulfilled with an increase in accuracy and decrease in False Positive Rate
Reference :
-
- W. Lee and S. J. Stolfo. “Data mining approaches for intrusion detection,” In Proceedings ofAntonio, TX, January 1998.
- Z. Muda, W. Yassin, M.N. Sulaiman, N.I. Udzir, “Intrusion Detection based on K-Means Clustering and OneR Classification”, In Proceedings of 7th International Conference on Information Assurance and Security (IAS), IEEE, 2011, pp.192-197.
- Snehlata S. Dongre and Kapil K. Wankhade, “Intrusion Detection System Using New Ensemble Boosting Approach”, In International Journal of Modeling and Optimization, Vol. 2, No. 4, August 2012, pp 488-492.
- Kapil Wankhade, MrudulaGudadhe, Prakash Prasad, “A New Data Mining Based Network Intrusion Detection Model”, In Proceedings of International Conference on Computer and Communication Technology (ICCCT 2010), IEEE, 2010, pp.731-735.
- Z. Muda, W. Yassin, M.N. Sulaiman, N.I. Udzir, “Intrusion Detection based on K-Means Clustering and Naïve Bayes Classification”, In Proceedings of 7th International Conference on IT in Asia (CITA), IEEE, 2011.
- Shaik Akbar, Dr.K.Nageswara Rao, Dr.J.A.Chandulal, “Intrusion Detection System Methodologies Based on Data Analysis”, In International Journal of Computer Applications (0975 – 8887) Volume 5– No.2, August 2010, pp.10-20.