Open Access Open Access  Restricted Access Subscription or Fee Access

Performance Enhancement of Intrusion Detection System Using Neural Network Technique

Pranita Jain, R. K. Pateriya, R. P. Singh

Abstract


Security issues, such as network intrusion and virus infection, are becoming more and more serious with the growth of computer and network applications. Intrusion is a set of actions which attempt to compromise the confidentiality, integrity or availability of a resources Intrusion detection systems are used to monitor computer system for sign of security violations. On detection of miscellaneous intrusion from the World Wide Web, we need effective intrusion detection system. In Practice, IDSs have been observed to trigger thousands of alerts per day, most of which are mistakenly triggered by begin events such as false positive. To address the problem of false positives clustering approach is used to groups similar type of attacks to enhance the performance of IDS. Here in this paper we present and implemented two clustering algorithm K-means centroid based data mining algorithm and Neural gas competive hebbian learning approach. These two algorithms are applied on intrusion detection dataset i. e KDDCUP99 dataset. The obtained results of Neural gas competive hebbian learning approach performs better in terms of Sum of square error (SSE).


Keywords


SSE, Data mining, Unsupervised Learning, IDS

Full Text:

PDF

References


K. M. Faraoun, A,Boukelif “Neural Networks Learning improvement using the K-means clustering algorithm to detect network intrusions,International journal of computational intelligence3;2, www. waset. org spring2007.

Ya Guan and Ali A. Ghobani ,Nabil Belacel “Ymeans:A clustering method for intrusion detection. montreal. May2003.

Nor Badrul Anuar1, Hasimi Sallehudin2,”Identifying false alarm for network intrusion detection system using hybrid data mining and decision tree. Malaysian Journal of Computer Science, Vol. 21(2), 2008

Wenke Lee, Sal Stolfo, and Kui Mok. Mining in a data environment: Experience in network intrusion detection. In Proc. 5thACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining, pages 114{124, San Diego, CA, August 1999.

Nong Ye and Xiangyang Li. A scalable clustering technique for intrusion signature recognition. In Proc. 2nd IEEE SMC Information Assurance, March 2004.

Axelsson S. , “Intrusion Detection Systems: A Survey and Taxonomy”.Technical report 99-15, Department of Computer Engineering, Chalmers University of Technology, Goteborg,Sweden, March 2000.

Bigus, Joseph P. ,“Data Mining with Neural Networks”, McGraw Hill, 1996. 24. Wenke Lee, Sal Stolfo and Kui Mok. ‘A Data Mining Framework for Building Intrusion Detection Models’, Proceedings of the 1999 IEEE Symposium on Security and Privacy, Oakland, CA, May 1999.

CERIAS, Intrusion Detection Research, Purdue University, Autonomous agents for intrusion detection13. Eugene H. Spafford and Diego Zamboni, “Intrusion detection using autonomous agents”, Computer Networks, 34(4):pp. 547-570, October 2000.

FAQ: Network Intrusion Detection Systems, Version 0. 8. 3, March 21,2000.

Debar H. , Becker M. , Siboni D. , “A Neural Network Component for an Intrusion Detection System”. Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA May 1992.

Leonid Portnoy, “Intrusion Detection with Unlabeled Data using Clustering'' In ACM Workshop on Data Mining Applied to Security,Philadelphia, PA, November 2001.

KD D Cup 1999 Data. University of California, Irvine,http://kdd. ics. uci.edu/databases/kddcup99/kddcup99. html.

Mrutyunjaya Panda,Manas Ranjan Patra, “Some clustering algorithms to enhance the performance of the network intrusion detection system.Journal of Theoretical and Applied Information Technology, 2005 –2008.

Dorothy E. Denning, “An Intrusion-Detection Model”, IEEE Transactions on Software Engineering, Vol. SE-13, No. 2, Feb. 1987,pp. 222-232.

Eleazar Eskin, Andrew Arnold, Michael Prerau, Leonid Portnoy and Salvatore Stolfo. ``A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data. '' To Appear in Data Mining for Security Applications. Kluwer 2002.

J. MacQueen. Some methods for classification and analysis of multivariate observations. Proceedings of Fifth Berkeley Symposium on Mathematical Statistics and Probability, 2:28ñ297, 1967.

Davé R. N. , Krishnapuram R. , “Robust Clustering Methods: A Unified View,” IEEE Transactions on Fuzzy Systems, 5(2), pp 270-293, 1997.

Lane, T. , and Brodley, C. E. 1999. Temporal sequence learning and data reduction for anomaly detection. ACM Transactions on Information and System Security.

Wei Fan, Matt Miller, Sal Stolfo, Wenke Lee, and Phil Chan, “Using Artificial Anomalies to Detect Unknown and Known Network Intrusions”, Proceedings of The First IEEE International Conference on Data Mining, San Jose, CA, November 2001.

Andrew Honig, Andrew Howard, Eleazar Eskin, and Salvatore Stolfo,“Adaptive Model Generation: An Architecture for the Deployment of Data Mining-based Intrusion Detection Systems'', to appear in Data Mining for Security Applications. Kluwer 2002.


Refbacks

  • There are currently no refbacks.