scholarly journals Association Rule Mining for Intrusion Detection System: A Survey

2019 ◽  
Vol 8 (1) ◽  
pp. 20-24
Author(s):  
D. Selvamani ◽  
V. Selvi

Many modern intrusion detection systems are based on data mining and database-centric architecture, where a number of data mining techniques have been found. Among the most popular techniques, association rule mining is one of the important topics in data mining research. This approach determines interesting relationships between large sets of data items. This technique was initially applied to the so-called market basket analysis, which aims at finding regularities in shopping behaviour of customers of supermarkets. In contrast to dataset for market basket analysis, which takes usually hundreds of attributes, network audit databases face tens of attributes. So the typical Apriori algorithm of association rule mining, which needs so many database scans, can be improved, dealing with such characteristics of transaction database. In this paper, a literature survey on the Association Rule Mining has carried out.

2020 ◽  
Vol 27 (1) ◽  
Author(s):  
AA Izang ◽  
SO Kuyoro ◽  
OD Alao ◽  
RU Okoro ◽  
OA Adesegun

Association rule mining (ARM) is an aspect of data mining that has revolutionized the area of predictive modelling paving way for data mining technique to become the recommended method for business owners to evaluate organizational performance. Market basket analysis (MBA), a useful modeling technique in data mining, is often used to analyze customer buying pattern. Choosing the right ARM algorithm to use in MBA is somewhat difficult, as most algorithms performance is determined by characteristics such as amount of data used, application domain, time variation, and customer’s preferences. Hence this study examines four ARM algorithm used in MBA systems for improved business Decisions. One million, one hundered and twele thousand (1,112,000) transactional data were extracted from Babcock University Superstore. The dataset was induced with Frequent Pattern Growth, Apiori, Association Outliers and Supervised Association Rule ARM algorithms. The outputs were compared using minimum support threshold, confidence level and execution time as metrics. The result showed that The FP Growth has minimum support threshold of 0.011 and confidence level of 0.013, Apriori 0.019 and 0.022, Association outliers 0.026 and 0.294 while Supervised Association Rule has 0.032 and 0.212 respectively. The FP Growth and Apirori ARM algorithms performed better than Association Outliers and Supervised Association Rule when the minimum support and confidence threshold were both set to 0.1. The study concluded by recommending a hybrid ARM algorithm to be used for building MBA Applications. The outcome of this study when adopted by business ventures will lead to improved business decisions thereby helping to achieve customer retention. Keywords: Association rule mining, Business ventures, Data mining, Market basket analysis, Transactional data.


Author(s):  
Ismasari Ismasari ◽  
Maulida Ramadhan ◽  
Wahyu Hadikristanto

Saat ini data mining telah diimplementasikan ke berbagai bidang salah satu diantaranya adalah pada bidang bisnis atau perdagangan yang dapat membantu para pebisnis dalam kebijakan pengambilan keputusan terhadap apa yang berhubungan dengan persediaan barang. Misalnya pentingnya sistem persediaan barang di suatu Toko dan jenis barang apa yang menjadi prioritas utama yang harus di stok untuk mengantisipasi kekosongan barang. Karena minimnya stok barang dapat berpengaruh pada pelayanan konsumen dan pendapatan Toko. Metode yang sering digunakan untuk menganalisa pola pembelian pelanggan adalah metode asosiasi atau association rule mining. Association rule mining adalah suatu metode untuk mencari pola hubungan antar satu atau lebih itemset yang ada dalam suatu dataset. Algoritma yang paling popular dalam mencari pola hubungan item set adalah algoritma apriori atau sering disebut dengan market basket analysis. Proses yang dilakukan dalam penelitian ini menggunakan tools Rapid Miner untuk mengolah data dengan algoritma apriori, dari pengujian yang dilakukan dengan parameter yang telah ditentukan yaitu minimum support 70% dan minimum confidence 80% menghasilkan 4 aturan asosiasi dengan nilai confidance 100% yaitu kombinasi item aqua 600ml-fulloblasto caramel cruncy chocolat - yupi 500 semua rasa - beng beng 25g. Dengan pencarian pola menggunakan algoritma apriori ini diharapkan informasi yang dihasilkan dapat meningkatakan strategi penjualan selanjutnya    


Author(s):  
Devaraju Sellappan ◽  
Ramakrishnan Srinivasan

Intrusion detection system (IDSs) are important to industries and organizations to solve the problems of networks, and various classifiers are used to classify the activity as malicious or normal. Today, the security has become a decisive part of any industrial and organizational information system. This chapter demonstrates an association rule-mining algorithm for detecting various network intrusions. The KDD dataset is used for experimentation. There are three input features classified as basic features, content features, and traffic features. There are several attacks are present in the dataset which are classified into Denial of Service (DoS), Probe, Remote to Local (R2L), and User to Root (U2R). The proposed method gives significant improvement in the detection rates compared with other methods. Association rule mining algorithm is proposed to evaluate the KDD dataset and dynamic data to improve the efficiency, reduce the false positive rate (FPR) and provides less time for processing.


Author(s):  
Devaraju Sellappan ◽  
Ramakrishnan Srinivasan

Intrusion detection system (IDSs) are important to industries and organizations to solve the problems of networks, and various classifiers are used to classify the activity as malicious or normal. Today, the security has become a decisive part of any industrial and organizational information system. This chapter demonstrates an association rule-mining algorithm for detecting various network intrusions. The KDD dataset is used for experimentation. There are three input features classified as basic features, content features, and traffic features. There are several attacks are present in the dataset which are classified into Denial of Service (DoS), Probe, Remote to Local (R2L), and User to Root (U2R). The proposed method gives significant improvement in the detection rates compared with other methods. Association rule mining algorithm is proposed to evaluate the KDD dataset and dynamic data to improve the efficiency, reduce the false positive rate (FPR) and provides less time for processing.


Sign in / Sign up

Export Citation Format

Share Document