Data Mining Methods for Attacks Recognition & Prevention

Authors

  • Shalini  Asst. Prof., Dept. of Computer Science & Engineering, Jyoti Vidyapeeth Women’s University, Jaipur, Rajasthan, India

Keywords:

Intrusion, Intrusion Detection System, Anomaly & Misuse Detection

Abstract

In modern era, due to several benefits digital system and services has gain high attention in each and every field, especially in communication area. Amount of users are increasing day by day. However, this technique facilitates its user in number of ways within effective time period but with the growth of users and chip technology some fears has also comes in front of its users. Security and trustworthy information is one of the most issues with the use of such technique. Different novel approaches made an endeavor to to impacting availability, confidentiality, and integrity of critical data that poses a serious problem for their detection and exploits safety vulnerabilities. On the other hand human labeling of the available network audit data instances is usually tedious, time consuming and expensive. Therefore it is essential for a system administrator that he/she use one or more security tools to protect information from passing before curious eyes or, more importantly, from falling into wrong hands. This paper will examine the intrusion detection systems, one of the relative new technologies in information security. It aims to explore, in high level, the intrusion detection systems available today, as well as new developments in this area by using data mining methodologies. Apart of simple reviewing of accessible technique this study has also focus on current research issues of this field.

References

  1. Overview of Attack Trends, 2002. Last accessed: November 30, 2008. http://www. cert.org/archive/pdf/attack_trends.pdf.
  2. Kapil Kumar Gupta, Baikunth Nath, Kotagiri Ramamohanarao, and Ashraf Kazi. Attacking Confidentiality: An Agent Based Approach. In Proceedings of IEEE International Conference on Intelligence and Security Informatics, pages 285?296. Lecture Notes in Computer Science, Springer Verlag, Vol (3975), 2006.
  3. Jian Pei Shambhu J. Upadhyaya Faisal Farooq Venugopal Govindaraju. Proceedings of the 20th International Conference on Data Engineering (ICDE?04) 1063-6382/04 $ 20.00 ? 2004 IEEE
  4. Debar, H., Dacier, M., and Wespi, A., A Revised taxonomyfor intrusion detection systems, Annales des Telecommunications, Vol. 55, No. 7?8, 361?378, 2000.
  5. Jackson, T., Levine, J., Grizzard, J., Owen, and H., “An investigation of a compromised host on a honeynet being used to increase the security of a large enterprise network,” IEEE workshop on Information Assurance and Security, IEEE, 2004.
  6. D. Y. Yeung, and Y. X. Ding, “Host-based intrusion detection using dynamic and static behavioral models,” Pattern Recognition, 36, 2003, pp. 229-243.
  7. X. Xu, and T. Xie, “A reinforcement learning approach for host-based intrusion detection using sequences of system calls,” In Proc. of International Conference on Intelligent Computing, Lecture Notes in Computer Science, LNCS 3644, 2005, pp. 995-1003.
  8. Krasser, S., Grizzard, J., Owen, H., and Levine. J., “The use of honeynets to increase computer network security and user awareness,” Journal of Security Education, vol. 1, 2005, pp. 23-37.
  9. Shon T., Seo J., and Moon J., “SVM approach with a genetic algorithm for network intrusion detection,” in Proc. of 20th International Symposium on Computer and Information Sciences (ISCIS 2005), Berlin: Springer-Verlag, 2005, pp. 224-233.
  10. X. Xu, X.N. Wang, “Adaptive network intrusion detection method based on PCA and support vector machines,” Lecture Notes in Artificial Intelligence (ADMA 2005), LNAI 3584, 2005, pp. 696-703.
  11. S. Rajasegarar, C. Leckie, J. C. Bezdek, and M. Palaniswami,“Centered hyperspherical and hyperellipsoidal one-class support vector machines for anomaly detection in sensor networks,” IEEE Transactions on Information Forensics and Security, vol. 5, no. 3, pp. 518?533, 2010.
  12. A. L. Buczak and E. Guven, “A survey of data mining and machine learning methods for cyber security intrusion detection,” IEEE Communications Surveys and Tutorials, vol. 18, no. 2, pp. 1153?1176, 2016.
  13. Mohammad Sazzadul Hoque, Md. Abdul Mukit, and M. A. N. Bikas, "An implementation of intrusion detection system using genetic algorithm," International Journal of Network Security & Its Applications (IJNSA), vol. 4, (2012).
  14. Frank Kargl, J?rn Maier, Stefan Schlott, Michael Weber “Protecting Web Servers from Distributed Denial of Service Attacks” ACM 1-58113-348-0/01/0005. May 1-5, 2001.
  15. Asmaa Shaker Ashoor, Prof. Sharad Gore ?Importance of Intrusion Detection System (IDS)? International Journal of Scientific & Engineering Research, Volume 2, Issue 1, January-2011
  16. Ranju Marwaha “Intrusion Detection System Using Data Mining Techniques? A Review” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 7, Issue 5, May 2017
  17. James P. Anderson, “Computer security threat monitoring and surveillance,” Technical Report 98-17, James P. Anderson Co., Fort Washington, Pennsylvania, USA, April 1980.
  18. Dorothy E. Denning, and P.G. Neumann “Requirement and model for IDES- A real-time intrusion detection system,” Computer Science Laboratory, SRI International, Menlo Park, CA 94025-3493, Technical Report # 83F83-01-00, 1985.
  19. H. S. Javitz and A. Valdes. The SRI IDES Statistical Anomaly Detector. In Proceedings of the IEEE Symposium on Security and Privacy, pages 316?326. IEEE, 1991.
  20. Prof.S.S.Manivannan, Dr.E.Sathiyamoorthy “Detection System to detect the Network Attack Groups using the Layer wise Individual Feature Set” International Journal of Engineering and Technology (IJET), Vol 5 No 4 Aug-Sep 2013
  21. Kriangkrai Limthong “Real-Time Computer Network Anomaly Detection Using Machine Learning Techniques” Journal of Advances in Computer Networks, Vol. 1, No. 1, March 2013.
  22. P.Sreenivasul, K.RameshReddy “ A Scalable Classifier for Intrusion Detection in Adhoc Networks” International Journal of Advanced Engineering and Global Technology Vol-2, Issue-4, April 2014
  23. Miss. M. R. Yadav, Prof. P. B. Kumbharkar “ Intrusion Detection System with Supervised Learning Algorithms” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 4, April 2014
  24. Amit D. Sagale, 2 Swati G. Kale “Combining Naive Bayesian and Support Vector Machine for Intrusion Detection System” IJCAT International Journal of Computing and Technology, Volume 1, Issue 3, April 2014
  25. Sunil Kumar, Surjeet Dalal “Optimizing Intrusion Detection System using Genetic Algorithm” International Journal of Research Aspects of Engineering and Management ISSN: 2348-6627, Vol. 1, Issue 1, FEB 2014, pp. 42-45
  26. Roshani Gaidhane, Student, Prof. C. Vaidya, Dr. M. Raghuwanshi “Survey: Learning Techniques for Intrusion Detection System (IDS)” International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 1, Issue 2, Feb 2014. ISSN 2348 ? 4853.
  27. Dr. Neelam Sharma, Yatendra Mohan Sharma “Exploration of Novel Layered Models for Improving Minority Attack Detection in IDS” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 1, January 2014
  28. Saurabh, P. and Verma, B. (2016), "An efficient proactive artificial immune system based anomaly detection and prevention system", Expert Systems with Applications, Vol. 60, pp.311-320.
  29. Guo, C., Ping, Y., Liu, N. and Luo, S.S. (2016), "A two-level hybrid approach for intrusion detection.", Neurocomputing, In Press, Corrected Proof, DOI: http://dx.doi.org/10.1016/j.neucom.2016.06.021.
  30. Shailendra Singh, Sanjay Silakari “An Ensemble Approach for Cyber Attack Detection System: A Generic Framework” 14th ACIS, IEEE 2013. Pp 79-85.
  31. Gaikwad, Sonali Jagtap, D.P. Kunal Thakare and Vaishali Budhawant. Anomaly Based Intrusion Detection System Using Artificial Neural Network and fuzzy clustering., International Journal of Engineering Research & Technology (IJERT), ISSN: 2278-0181, November- 2012; 1(9).
  32. Lin Gu, Deze Zeng, Peng Li, and Song Guo. Cost Minimization for Big Data Processing in Geo-Distributed Data Centers,IEEE Transactions on Emerging Topics in Computing;2014.

Downloads

Published

2017-08-31

Issue

Section

Research Articles

How to Cite

[1]
Shalini, " Data Mining Methods for Attacks Recognition & Prevention, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 3, Issue 6, pp.578-584, July-August-2017.