Comprehensive Study of KDD99 Dataset and Data Mining Tools for Intrusion Detection

Kamini Nalavade*, **
* Research Scholar, Computer Engineering Department, VJTI, Matunga, Mumbai, India.
** Professor & Head, Computer Engineering Department, VJTI, Matunga, Mumbai, India.
Periodicity:March - May'2014
DOI : https://doi.org/10.26634/jit.3.2.2780

Abstract

Due to extensive growth of the Internet and increasing availability of tools and methods for intruding and attacking networks, intrusion detection has become a critical component of network security parameters. Intrusion detection in large data is one of the major challenge for the researchers in this area. Anomaly detection using data mining techniques has attracted the attention of many researchers to overcome the weakness of signature-based IDSs in detecting novel attacks and KDDCUP’99 is the mostly widely used data set for the evaluation of these systems. In this paper we have conducted an comprehensive study and statistical analysis on KDD dataset. We also provide description of features and instances of the dataset. The another important challenge for the researchers in this area is to select an appropriate data mining tool for the analysis. The paper disusses two important and popular tools in this area, weka, Oracle data mining and tanagara. We hope that study carried out in his paper is useful for the reasearcheres in the area of intrusion detection.

Keywords

Intrusion, Security, Dataset, Data Mining, KDDcup

How to Cite this Article?

Nalavade, K., and Meshram, B. B. (2014). Comprehensive Study of KDD99 Dataset and Data Mining Tools for Intrusion Detection. i-manager’s Journal on Information Technology, 3(2), 28-35. https://doi.org/10.26634/jit.3.2.2780

References

[1]. Mahbod Tavallaee, Ebrahim Bagheri, Wei Lu, and Ali A. Ghorbani, (2009). “A Detailed Analysis of the KDD CUP 99 Data Set”, IEEE Symposium on Computational Intelligence and Security and Defense Applications (CISDA)
[2]. Mohammad Khubeb Siddiqui and Shams Naahid (2013), Analysis of KDD CUP 99 Dataset using Clustering based Data Mining International Journal of Database. Theory and Application Vol.6, No.5 pp.23-34.
[3]. J. McHugh, (2000). “Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory,” ACM Transactions on Information and System Security , Vol. 3, No. 4, pp. 262–294.
[4]. http://www.kdnuggets.com/datasets/kddcup.html
[5]. www.cs.waikato.ac.nz/ml/ weka/.
[ 6 ] . http: // eric. univ- lyon2 . fr /~ricco / tanagra /en / tanagra.html.
[7] M. Mahoney and P. Chan, (2003). “An Analysis of the 1999 DARPA/LincolnLaboratory Evaluation Data for Network Anomaly Detection,” Lecture Notes in Computer Science, pp. 220– 238.
[8]. L. Portnoy, E. Eskin, and S. Stolfo, (2001). “Intrusion detection with unlabeled data using clustering,” Proceedings of ACM CSS Workshop on Data Mining Applied to Security, Philadelphia, PA, November.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.