Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

An Investigation of Intrusion Detection in UDP Data Streams


Affiliations
1 Department of Information Technology, Periyar Maniammai University, Thanjavur-613403, India
2 Department of Information Technology, Periyar Maniammai University, Thanjavur-613403, India
     

   Subscribe/Renew Journal


Securing the local network is a crucial task for any system administrator, as the activities in a network vary widely from simple data searching to online commercial transactions in many organizations. Intrusion detection systems (IDS) are extremely useful in this task. Detecting intrusions and identifying various methods or types of intrusions play an important role for predicting an intrusion and securing the network in the long run. Data mining techniques are being increasingly used to study the data streams with good results in IDS. In this paper we propose to extract unique signatures from UDP data streams, and predict intrusion using data mining techniques. We have used the KDD cup 1999 dataset that contains a wide variety of intrusion attacks simulated in a military environment.

Keywords

Decision Trees, KDD Cup Dataset, Random Tree, Supervised Learning Model, Naïve Bayes.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 215

PDF Views: 3




  • An Investigation of Intrusion Detection in UDP Data Streams

Abstract Views: 215  |  PDF Views: 3

Authors

R. Sridevi
Department of Information Technology, Periyar Maniammai University, Thanjavur-613403, India
Rajan Chattamvelli
Department of Information Technology, Periyar Maniammai University, Thanjavur-613403, India

Abstract


Securing the local network is a crucial task for any system administrator, as the activities in a network vary widely from simple data searching to online commercial transactions in many organizations. Intrusion detection systems (IDS) are extremely useful in this task. Detecting intrusions and identifying various methods or types of intrusions play an important role for predicting an intrusion and securing the network in the long run. Data mining techniques are being increasingly used to study the data streams with good results in IDS. In this paper we propose to extract unique signatures from UDP data streams, and predict intrusion using data mining techniques. We have used the KDD cup 1999 dataset that contains a wide variety of intrusion attacks simulated in a military environment.

Keywords


Decision Trees, KDD Cup Dataset, Random Tree, Supervised Learning Model, Naïve Bayes.