scholarly journals A Novel Research on Real-Time Intrusion Detection Technology Based on Data Mining

2019 ◽  
Vol 1345 ◽  
pp. 052016
Author(s):  
Kui Yang
Author(s):  
Amalia Agathou ◽  
Theodoros Tzouramanis

Over the past few years, the Internet has changed computing as we know it. The more possibilities and opportunities develop, the more systems are subject to attack by intruders. Thus, the big question is about how to recognize and handle subversion attempts. One answer is to undertake the prevention of subversion itself by building a completely secure system. However, the complete prevention of breaches of security does not yet appear to be possible to achieve. Therefore these intrusion attempts need to be detected as soon as possible (preferably in real time) so that appropriate action might be taken to repair the damage. This is what an intrusion detection system (IDS) does. IDSs monitor and analyze the events occurring in a computer system in order to detect signs of security problems. However, intrusion detection technology has not yet reached perfection. This fact has provided data mining with the opportunity to make several important contributions and improvements to the field of IDS technology (Julisch, 2002).


Data ◽  
2020 ◽  
Vol 6 (1) ◽  
pp. 1
Author(s):  
Ahmed Elmogy ◽  
Hamada Rizk ◽  
Amany M. Sarhan

In data mining, outlier detection is a major challenge as it has an important role in many applications such as medical data, image processing, fraud detection, intrusion detection, and so forth. An extensive variety of clustering based approaches have been developed to detect outliers. However they are by nature time consuming which restrict their utilization with real-time applications. Furthermore, outlier detection requests are handled one at a time, which means that each request is initiated individually with a particular set of parameters. In this paper, the first clustering based outlier detection framework, (On the Fly Clustering Based Outlier Detection (OFCOD)) is presented. OFCOD enables analysts to effectively find out outliers on time with request even within huge datasets. The proposed framework has been tested and evaluated using two real world datasets with different features and applications; one with 699 records, and another with five millions records. The experimental results show that the performance of the proposed framework outperforms other existing approaches while considering several evaluation metrics.


2014 ◽  
Vol 631-632 ◽  
pp. 946-951 ◽  
Author(s):  
Guang Cai Cui ◽  
Bai Tong Liu

For traditional intrusion detection technology, the lack of intelligent and self-adaptive has become increasingly prominent when they cope with unknown attacks. A method based on genetic algorithm was presented for discovering and learning the intrusion detection rules. This algorithm uses the network data packet as an original data source, after pretreatment, initialized them to be the initial population of the genetic algorithm, then derive the classification rules. These rules were used to detect or classify network intrusions in a real-time network environment, selecting the intrusion packets. The experiment proves the efficiency of the presented method.


Author(s):  
V.P. Kshirsagar ◽  
Sonali M. Tidke ◽  
S.S. Vishnu

Network security is of primary concerned now days for large organizations. Various types of Intrusion Detection Systems (IDS) are available in the market like Host based, Network based or Hybrid depending upon the detection technology used by them. Modern IDS have complex requirements. With data integrity, confidentiality and availability, they must be reliable, easy to manage and with low maintenance cost. Various modifications are being applied to IDS regularly to detect new attacks and handle them. In this paper, we are focusing on genetic algorithm (GA) and data mining based Intrusion Detection System.


Sign in / Sign up

Export Citation Format

Share Document