Network Intrusion Detection system based on Feature Selection and Triangle area Support Vector Machine

  ijett-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2012 by IJETT Journal
Volume-3 Issue-4                          
Year of Publication : 2012
Authors :  Venkata Suneetha Takkellapati , G.V.S.N.R.V Prasad

Citation 

Venkata Suneetha Takkellapati , G.V.S.N.R.V Prasad. "Network Intrusion Detection system based on Feature Selection and Triangle area Support Vector Machine". International Journal of Engineering Trends and Technology (IJETT). V3(4):466-470 Jul-Aug 2012. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract

As the cost of the data processing and Internet accessibility increases, more and more organizations are be - coming vulnerable to a wide range of cyber threats. Most current offline intrusion detection systems are focused on unsupervised and supervised machine learning approaches. Existing model has high error rate during the attack classification usi ng support vector machine learning algorithm. Besides, with the study of existing work, feature selection techniques are also essential to improve high efficiency and effectiveness. Performance of different types of attacks detection should also be improv ed and evaluated using the proposed approach. In this proposed system, Information Gain (IG) and Triangle Area based KNN are used for selecting more discriminative features by combining Greedy k - means clustering algorithm and SVM classifier to detect Ne twork attacks. This system achieves high accuracy detection rate and less error rate of KDD CUP 1999 training data set.

References

[1] Protecting Against Cyber Threats in Networked Information Systems L. Ertoz.
[2] W. Lee, S. J. Stolfo, Data Mining Approaches for Intrusion Detection, Proceedings of the 1998 USENIX Security Symposium , 1998.
[3]. E. Bloedorn, et al., Data Mining for Network Intrusion Detection: How to Get Started, MITRE Technical Report , August 2001.
[4] D. Barbara, N. Wu, S. Jajodia, Detecting Novel Network Intrusions Using Bayes Estimators, Proceedings of the First SIAM Conference on Data Mining , Chicago, IL, 2001.
[5]. S. Manganaris, M. Christensen, D. Serkle, and K. Hermix, A Data Mining Analysis of RTID Alarms, Proceedi ngs of the 2nd International Workshop on Recent Advances in Intrusion Detection ( RAID 99), West Lafayette, IN, September 1999.
[6]. Cohen, W. W., ”Fast effective rule induction”, In A. Prieditis and S. Russell (Eds.), Proc. of the 12th International Confer ence on Machine Learning, Tahoe City, CA, pp. 115123. Morgan Kaufmann, 9 - 12 July, 1995.
[7]. S. Stolfo, A. L. Prodromidis and P. K. Chan, ”JAM: Java Agents for Meta - Learning over Distributed Databases”, in Proceedings of the Third International Conference on Knowledge Discovery and Data Mining, D. Heckerman, H. Mannila, D. Pregibon, and R. Uthurusamy, editors, AAAI Press, Menlo Park, 1997.
[8]. Lee, W., S. J. Stolfo, and K. W. Mok, ” Mining in a data - flow environment: Experience in network intrusion detect ion,” In S. Chaudhuri and D. Madigan (Eds.), Proc. of the Fifth International Conference on Knowledge Discovery and Data Mining (KDD - 99), San Diego, CA, pp. 114124. ACM, 12 - 15 August 1999.
[9]. Lee, W., S. J. Stolfo, and K. W. Mok, ”Adaptive intrusion dete ction: A data mining approach,” Artificial Intelligence Review 14 (6), 533567, 2000.

Keyword
Intrusion, IDS,data mining.