Open Access
Subscription Access
Open Access
Subscription Access
Comprehensive Evolution of Different Methods Used in Data Mining-Based Intrusion Detection System
Subscribe/Renew Journal
Intrusion is defined as an invasion that consists of set-of-actions that compromise upon the integrity, confidentiality or availability of data-resource/s. Therefore, intrusion detection is an important task when dealing with an information infrastructure for security. A major challenge in intrusion detection is to unearth intrusions that happen almost instantaneously and thereafter lay embedded, to be discovered, in vast scattered resources in a normally operating real-time communication environment. Data mining process working on intrusion detection is to identify valid, novel, potentially useful, and ultimately understandable patterns in massive data. Thus, it can be understood that, it is challenging as well as demanding to apply data mining techniques to detect intrusions of various types in an information infrastructure resource/s. To start with, our paper discusses different intrusion detection techniques that brings out and presents the underlying concepts and associated application of data mining approaches as an applied tool against intrusion detection system. Techniques include, Support Vector Machines (SVMs) that was designed and utilized as classifiers for binary classification/s, and helped to solve multi-class problems. In this paper we bring in the fusion of Decision-Tree and Support Vector Machine (DT-SVM) which combines and reinforce in an effective way for solving multi-class problems in the information resource domain. This method has the potential, as confirmed in our findings, to decrease the training and testing time, contributing to increased efficiency of the system. The construction order of binary tree significantly influences classification performance. Towards the end of the paper we report aspects relating to development of an algorithm that combines to produce a Tree structured multi-class SVM as an intrusion detection data mining technique, which has been applied successfully for the purpose of classifying data that aid the process of intrusion detection.
Keywords
Ant-Miner, COD (Common Outlier Detection), Decision Tree, Fuzzy C-Means, K-Means, MACO, Support Vector Machine (SVM) and Decision-Tree and Support Vector Machine (DT-SVM).
User
Subscription
Login to verify subscription
Font Size
Information
Abstract Views: 229
PDF Views: 3