Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Comprehensive Evolution of Different Methods Used in Data Mining-Based Intrusion Detection System


Affiliations
1 Charotar Institute of Technology Changa, Gujarat, India
2 Dharmsinh Desai University, Nadiad, Gujarat, India
     

   Subscribe/Renew Journal


Intrusion is defined as an invasion that consists of set-of-actions that compromise upon the integrity, confidentiality or availability of data-resource/s. Therefore, intrusion detection is an important task when dealing with an information infrastructure for security. A major challenge in intrusion detection is to unearth intrusions that happen almost instantaneously and thereafter lay embedded, to be discovered, in vast scattered resources in a normally operating real-time communication environment. Data mining process working on intrusion detection is to identify valid, novel, potentially useful, and ultimately understandable patterns in massive data. Thus, it can be understood that, it is challenging as well as demanding to apply data mining techniques to detect intrusions of various types in an information infrastructure resource/s. To start with, our paper discusses different intrusion detection techniques that brings out and presents the underlying concepts and associated application of data mining approaches as an applied tool against intrusion detection system. Techniques include, Support Vector Machines (SVMs) that was designed and utilized as classifiers for binary classification/s, and helped to solve multi-class problems. In this paper we bring in the fusion of Decision-Tree and Support Vector Machine (DT-SVM) which combines and reinforce in an effective way for solving multi-class problems in the information resource domain. This method has the potential, as confirmed in our findings, to decrease the training and testing time, contributing to increased efficiency of the system. The construction order of binary tree significantly influences classification performance. Towards the end of the paper we report aspects relating to development of an algorithm that combines to produce a Tree structured multi-class SVM as an intrusion detection data mining technique, which has been applied successfully for the purpose of classifying data that aid the process of intrusion detection.

Keywords

Ant-Miner, COD (Common Outlier Detection), Decision Tree, Fuzzy C-Means, K-Means, MACO, Support Vector Machine (SVM) and Decision-Tree and Support Vector Machine (DT-SVM).
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 227

PDF Views: 3




  • Comprehensive Evolution of Different Methods Used in Data Mining-Based Intrusion Detection System

Abstract Views: 227  |  PDF Views: 3

Authors

Chintan M. Bhatt
Charotar Institute of Technology Changa, Gujarat, India
Amit P. Ganatra
Charotar Institute of Technology Changa, Gujarat, India
C. K. Bhensdadia
Dharmsinh Desai University, Nadiad, Gujarat, India
Yogeshwar P. Kosta
Charotar Institute of Technology Changa, Gujarat, India

Abstract


Intrusion is defined as an invasion that consists of set-of-actions that compromise upon the integrity, confidentiality or availability of data-resource/s. Therefore, intrusion detection is an important task when dealing with an information infrastructure for security. A major challenge in intrusion detection is to unearth intrusions that happen almost instantaneously and thereafter lay embedded, to be discovered, in vast scattered resources in a normally operating real-time communication environment. Data mining process working on intrusion detection is to identify valid, novel, potentially useful, and ultimately understandable patterns in massive data. Thus, it can be understood that, it is challenging as well as demanding to apply data mining techniques to detect intrusions of various types in an information infrastructure resource/s. To start with, our paper discusses different intrusion detection techniques that brings out and presents the underlying concepts and associated application of data mining approaches as an applied tool against intrusion detection system. Techniques include, Support Vector Machines (SVMs) that was designed and utilized as classifiers for binary classification/s, and helped to solve multi-class problems. In this paper we bring in the fusion of Decision-Tree and Support Vector Machine (DT-SVM) which combines and reinforce in an effective way for solving multi-class problems in the information resource domain. This method has the potential, as confirmed in our findings, to decrease the training and testing time, contributing to increased efficiency of the system. The construction order of binary tree significantly influences classification performance. Towards the end of the paper we report aspects relating to development of an algorithm that combines to produce a Tree structured multi-class SVM as an intrusion detection data mining technique, which has been applied successfully for the purpose of classifying data that aid the process of intrusion detection.

Keywords


Ant-Miner, COD (Common Outlier Detection), Decision Tree, Fuzzy C-Means, K-Means, MACO, Support Vector Machine (SVM) and Decision-Tree and Support Vector Machine (DT-SVM).