Existing Intrusion Detection System Using Data Mining: A Survey

Nikhil Kulshrestha*, **
* MCA Student, Institute of Information Technology and Management, India.
** Associate Professor (IT), Institute of Information Technology and Management, India
Periodicity:June - August'2013
DOI : https://doi.org/10.26634/jit.2.3.2406

Abstract

Data Mining is a process of discovering patterns in a large data set. On other side Network Security is a most significant problem of Information Era. An Intrusion Detection System is an important part of the security management system for computers and networks that tries to detect break-ins or break-in attempts. There are various approaches for intrusion detection system such as signature – based, anomaly – based, specification – based. Among all the available approaches, anomaly detection approach is the one which is suitable for detecting the novel attacks. By using of data mining techniques in network security new intrusion detection systems are developed. This paper will discuss some data mining techniques which are applied to create intrusion detection systems and their performance comparisons.

Keywords

Data mining, Intrusion Detection System, SNORT, Network Intrusion Detection System, Association Rule Mining, Frequent Episode Rule.

How to Cite this Article?

Kulshrestha, N., and Dahiya, R. (2013). Existing Intrusion Detection System Using Data Mining: A Survey. i-manager’s Journal on Information Technology, 2(3), 19-24. https://doi.org/10.26634/jit.2.3.2406

References

[1]. Aleksandar Lazarevic et al. “Detection of Novel Network Attacks Using Data Mining”
[2]. Animesh Patcha and Jung-Min Park. “An Overview of Anomaly Detection Techniques: Existing Solutions and Latest Technological Trends”.
[3]. Anshu Veda, Prajakta Kalekar and Anirudha Bodhankar. “Intrusion Detection Using Data mining Techniques”.
[4]. Asim Das and S.Siva Sathya. (2012). “Association Rule Mining For KDD Intrusion Detection Data Set”. Presented in International Journal of Computer Science and Informatics ISSN (PRINT): 2231 –5292, Volume-2, Issue-3, 2012.
[5]. Bhavani Thuraisingham et. al. (2008). “Data Mining for Security Applications” presented in 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
[6]. Dong Jianfeng. (2012). “The Application of Data Mining Technology in Network Security Management”. Presented in 2012 International Conference on Electrical and Computer Engineering-Advances in Biomedical Engineering, Vol.11
[7]. Eric Bloedorn, et. al. “Data Mining for Network Intrusion Detection: How to Get Started"
[8]. Faeiz Alserhani et. al. “Snort Performance Evaluation”.
[9]. Huy Anh Nguyen and Deokjai Choi. “Application of Data Mining to Network Intrusion Detection: Classifier Selection Model”.
[10]. Jiawei Han and Micheline Kamber. “Data Mining: Concepts and Techniques”
[11]. John Galloway and Simeon J. Simoff. “Network Data Mining: Methods and Techniques for Discovering Deep Linkage between Attributes”.
[12]. Leonid Portnoy. “Intrusion Detection With Unlabeled Data Using Clustering”.
[13]. Marcos M. Campos, Boriana L. Milenova. “Creation and Deployment of Data Mining-Based Intrusion Detection Systems in Oracle Database 10g”
[14]. Maricel Balitanas. (2008). “A Study on Integrating IDS with Data Mining”. Presented in Journal of Security Engineering
[15]. Min Qin and Kai Hwang. “Effectively Generating Frequent Episode Rules for Anomaly-based Intrusion Detection”.
[16]. Min Qin and Kai Hwang. “Frequent Episode Rules for Intrusive Anomaly Detection with Internet Data mining”
[17]. Min-Feng Wang, Yen-Ching Wu, and Meng-Feng Tsai. “Exploiting Frequent Episodes in Weighted Suffix Tree to Improve Intrusion Detection System”.
[18]. Mrs. Sneha Kumari and Dr. Maneesh Shrivastava. (2012). “A Study Paper on IDS Attack Classification Using Various Data Mining Techniques”. International Journal of Advanced Computer Research Vol. 2 No 3. Issue-5 .
[19]. P. Garci´a-Teodoro et. Al. (2009). “Anomaly-based network intrusion detection: Techniques, systems and challenges”. Computers & security ,28 I8 – 28.
[20]. Paul Dokas. “Data Mining for Network Intrusion Detection”.
[21]. Qiang Wang and Vasileios Megalooikonomou. “A Clustering Algorithm for Intrusion Detection”.
[22]. S Terry Brugger “Data Mining Methods for Network Intrusion Detection”
[23]. Sarat M. Kocherlakota, Christopher G. Healey. “Summarization Techniques for Visualization of Large Multidimensional Datasets”.
[24]. Shashank Shanbhag and Tilman Wolf. “Evaluation of an Online Parallel Anomaly Detection System”.
[25]. Theodoros Lappas and Konstantinos Pelechrinis. “Data Mining Techniques for (Network) Intrusion Detection Systems”.
[26]. U Aickelin, J Twycross and T Hesketh-Roberts. “Rule Generalisation using Snort”.
[27]. Vikas Markam and Lect. Shirish Mohan Dubey. (2012). “A General Study of Associations rule mining in Intrusion Detection System”. Presented in International Journal of Emerging Technology and Advanced Engineering (ISSN 2250-2459, Vol. 2, Issue 1.
[28]. Wenke Lee et al. “Real Time Data Mining-based Intrusion Detection”
[29]. Yogita B. Bhavsar and Kalyani C. Waghmare. (2013). “Intrusion Detection System Using Data Mining Technique: Support Vector Machine”. Presented in International Journal of Emerging Technology and Advanced Engineering (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Vol. 3, Issue 3.
[30]. Pang - Ning, Michael- Steinbach, (2009). “Introduction to Data Mining”, Pearson, 4th Ed.,.
[31]. G. K. Gupta, (2006). “Introduction to Data Mining with Case Studies”, PHI.
[32]. http://www.sans.org/security-resources/idfaq/data_ mining.php
[33]. Http://en.wikipedia.org/wiki/Intrusion_detection_ system
[34]. Http://www.r-bloggers.com/data-mining-fornetwork- security-and-intrusion-detection/
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.