International Journal of Engineering
Trends and Technology

Research Article | Open Access | Download PDF

Volume 3 | Issue 4 | Year 2012 | Article Id. IJETT-V3I4P201 | DOI : https://doi.org/10.14445/22315381/IJETT-V3I4P201

Network Intrusion Detection system based on Feature Selection and Triangle area Support Vector Machine


Venkata Suneetha Takkellapati , G.V.S.N.R.V Prasad

Citation :

Venkata Suneetha Takkellapati , G.V.S.N.R.V Prasad, "Network Intrusion Detection system based on Feature Selection and Triangle area Support Vector Machine," International Journal of Engineering Trends and Technology (IJETT), vol. 3, no. 4, pp. 466-470, 2012. Crossref, https://doi.org/10.14445/22315381/IJETT-V3I4P201

Abstract

As the cost of the data processing and Internet accessibility increases, more and more organizations are be - coming vulnerable to a wide range of cyber threats. Most current offline intrusion detection systems are focused on unsupervised and supervised machine learning approaches. Existing model has high error rate during the attack classification usi ng support vector machine learning algorithm. Besides, with the study of existing work, feature selection techniques are also essential to improve high efficiency and effectiveness. Performance of different types of attacks detection should also be improv ed and evaluated using the proposed approach. In this proposed system, Information Gain (IG) and Triangle Area based KNN are used for selecting more discriminative features by combining Greedy k - means clustering algorithm and SVM classifier to detect Ne twork attacks. This system achieves high accuracy detection rate and less error rate of KDD CUP 1999 training data set.

Keywords

Intrusion, IDS,data mining.

References

[1] Protecting Against Cyber Threats in Networked Information Systems L. Ertoz.
[2] W. Lee, S. J. Stolfo, Data Mining Approaches for Intrusion Detection, Proceedings of the 1998 USENIX Security Symposium , 1998.
[3]. E. Bloedorn, et al., Data Mining for Network Intrusion Detection: How to Get Started, MITRE Technical Report , August 2001.
[4] D. Barbara, N. Wu, S. Jajodia, Detecting Novel Network Intrusions Using Bayes Estimators, Proceedings of the First SIAM Conference on Data Mining , Chicago, IL, 2001.
[5]. S. Manganaris, M. Christensen, D. Serkle, and K. Hermix, A Data Mining Analysis of RTID Alarms, Proceedi ngs of the 2nd International Workshop on Recent Advances in Intrusion Detection ( RAID 99), West Lafayette, IN, September 1999.
[6]. Cohen, W. W., ”Fast effective rule induction”, In A. Prieditis and S. Russell (Eds.), Proc. of the 12th International Confer ence on Machine Learning, Tahoe City, CA, pp. 115123. Morgan Kaufmann, 9 - 12 July, 1995.
[7]. S. Stolfo, A. L. Prodromidis and P. K. Chan, ”JAM: Java Agents for Meta - Learning over Distributed Databases”, in Proceedings of the Third International Conference on Knowledge Discovery and Data Mining, D. Heckerman, H. Mannila, D. Pregibon, and R. Uthurusamy, editors, AAAI Press, Menlo Park, 1997.
[8]. Lee, W., S. J. Stolfo, and K. W. Mok, ” Mining in a data - flow environment: Experience in network intrusion detect ion,” In S. Chaudhuri and D. Madigan (Eds.), Proc. of the Fifth International Conference on Knowledge Discovery and Data Mining (KDD - 99), San Diego, CA, pp. 114124. ACM, 12 - 15 August 1999.
[9]. Lee, W., S. J. Stolfo, and K. W. Mok, ”Adaptive intrusion dete ction: A data mining approach,” Artificial Intelligence Review 14 (6), 533567, 2000.

Time: 0.0014 sec Memory: 32 KB
Current: 1.88 MB
Peak: 4 MB