Data Mining and Expert System Based on Efficient IDS

Seema Ranga, Uiet kurukshetra; Ajay Jangra ,Uiet kurukshetra

ids, testing, weka, redundent, classification

With popularization of internet, internet attack cases are also increasing, thus information safety has become a significant issue all over the world, hence Nowadays, it is an urgent need to detect, identify and hold up such attacks effectively [1]. In this modern world intrusion occurs in a fraction of seconds and Intruders cleverly use the adapted version of command and thereby erasing their footprints in audit and log files. Successful IDS intellectually differentiate both intrusive and nonintrusive records. Most of the existing systems have security breaches that make them simply vulnerable and could not be solved. Moreover substantial research has been going on intrusion detection system which is still considered as immature and not a perfect tool against intrusion. It has also become a most priority and difficult tasks for network administrators and security experts. So it cannot be replaced by more secure systems [2].
    [1] Su-Yun Wua, Ester Su-Yun Wua” Data mining-based intrusion detectors Crown Copyright” 2008 Published by Elsevier Ltd. [2] G.V. Nadiammai,“ Effective approach toward Intrusion Detection System using data mining techniques”2013. [3] Bace, Rebecca G. “ NIST special publication on intrusion detection systems”IEEE2002. [4] Kalpana Jaswal, Seema Rawat,Praveen Kumar “Design and Development of a prototype Application for Intrusion Detection using Data mining” 2015 IEEE. [5] S.V. Shirbhate, Dr.S.S.Sherkar, Dr.V.M.Thakare ” Performance Evaluation of PCA Filter In Clustered Based Intrusion DetectionSystem”2014. [6] Muamer N. Mohammada, Norrozila Sulaimana, Osama Abdulkarim Muhsinb “A Novel Intrusion Detection System by using Intelligent Data Mining in Weka Environment”2010. [7] D. Patterson, F. Liu, D. Turner “Performance Comparison of the Data Reduction System. Proceedings of the SPIE Symposium on Defense and Security”2008. [8] M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann and I.H. Witten, “The WEKA Data Mining Software: An Update” 2009. [9] Weka: Data Mining Software in Java http://www.cs.waikato.ac.nz/ml/weka [10] B.X.Wang, D.H.Zhang, J.Wang, et al, “Application of Neural Network to Prediction of Plate Finish Cooling Temperature”, Journal of Central South University of Technology, 2008. [11] Ian H.Witten and Elbe Frank, "Datamining Practical Machine Learning Tools and Techniques" 2005. [12] Yang Yong” The Research of Imbalanced Data Set of Sample Sampling Method Based on K-Means Cluster and Genetic Algorithm” © 2011, 164 – 170 [13] Li Hanguang, Ni Yu “Intrusion Detection Technology Research Based on Apriori Algorithm”2012. [14] Nadya EL Moussaid, Ahmed Toumanari Essi, “Overview of Intrusion Detection Using Data-Mining and the featuresselection”IEEE2015.
Paper ID: GRDJEV01I100006
Published in: Volume : 1, Issue : 10
Publication Date: 2016-10-01
Page(s): 1 - 7