Important Roles Of Data Mining Techniques For Anomaly Intrusion Detection System  

Abstract

Today, there are so many information interchanges are performed in that internet as the increasing the amount of using internet. That why, the methods used as intrusion detective tools for protecting network systems against diverse attacks are became too important. The available of IDS are getting more powerful. But, modern intrusion detection system facing complex problems. These system has to be require reliable, extensible, easy to manage, and have low maintenance cost. In recent years, data mining-based intrusion detection systems (IDSs) have demonstrated high accuracy, good generalization to novel types of intrusion, and robust behavior in a changing environment. In this proposed model, we focus on the best two data mining algorithms for intrusion detection system. The k-Nearest Neighbor was used as the classical pattern reorganization tools have been widely used for Intruder detections. There have some different characteristic of features in building an Intrusion Detection System. Conventional k-NN do not concern about that. Our enhanced Model proposed with an Random Forest (RDF) and k-Nearest Neighbor (kNN) method to perform more accurate classification task of the new model. RDF can select more important features and kNN can select more precisely than the conventional System. Experiments and comparisons are conducted through intrusion dataset: the KDD Cup 1999 dataset. 

Authors and Affiliations

Phyu Thi Htun , Kyaw Thet Khaing

Keywords

Related Articles

A Low Power Asynchronous FPGA with Autonomous Fine Grain Power Gating and LEDR Encoding

Field Programmable Gate Arrays (FPGAs) are widely used to implement special purpose processors. FPGAs are economically cheaper for low quantity production because its function can be directly reprogrammed by end users. I...

Performance Study of Interweave Spectrum Sharing Method in Cognitive Radio  

Spectrum scarcity is one of the most critical recent problems in the field of wireless communication. One of the promising approaches to resolve this issue is the use of Cognitive Radio technique. CR technique is p...

Intrusion Detection Based Security Solution for Cluster Based WSN  

Wireless sensor network (WSN) can provide low cost solution to variety of real-world problems. Sensors are low cost tiny devices with limited storage, computational capability and power. they can be deployed in...

FPGA Implementation of an Advanced Traffic Light Controller using Verilog HDL  

Traffic lights are the signaling devices used to manage traffic on multi-way road. These are positioned to control the competing flow of the traffic at the road intersections to avoid collisions. By displaying ligh...

A Tailored Ontology Sculpt For Web Information Congregation 

As a sculpt for acquaintance explanation and exemplification, ontologies are extensively used to symbolize consumer profiles in tailored web information congregation. Conversely, when representing consumer profiles...

Download PDF file
  • EP ID EP146574
  • DOI -
  • Views 79
  • Downloads 0

How To Cite

Phyu Thi Htun, Kyaw Thet Khaing (2013). Important Roles Of Data Mining Techniques For Anomaly Intrusion Detection System  . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 2(5), 1850-1854. https://europub.co.uk/articles/-A-146574