Important Roles Of Data Mining Techniques For Anomaly Intrusion Detection System
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 5
Abstract
Today, there are so many information interchanges are performed in that internet as the increasing the amount of using internet. That why, the methods used as intrusion detective tools for protecting network systems against diverse attacks are became too important. The available of IDS are getting more powerful. But, modern intrusion detection system facing complex problems. These system has to be require reliable, extensible, easy to manage, and have low maintenance cost. In recent years, data mining-based intrusion detection systems (IDSs) have demonstrated high accuracy, good generalization to novel types of intrusion, and robust behavior in a changing environment. In this proposed model, we focus on the best two data mining algorithms for intrusion detection system. The k-Nearest Neighbor was used as the classical pattern reorganization tools have been widely used for Intruder detections. There have some different characteristic of features in building an Intrusion Detection System. Conventional k-NN do not concern about that. Our enhanced Model proposed with an Random Forest (RDF) and k-Nearest Neighbor (kNN) method to perform more accurate classification task of the new model. RDF can select more important features and kNN can select more precisely than the conventional System. Experiments and comparisons are conducted through intrusion dataset: the KDD Cup 1999 dataset.
Authors and Affiliations
Phyu Thi Htun , Kyaw Thet Khaing
A Low Power Asynchronous FPGA with Autonomous Fine Grain Power Gating and LEDR Encoding
Field Programmable Gate Arrays (FPGAs) are widely used to implement special purpose processors. FPGAs are economically cheaper for low quantity production because its function can be directly reprogrammed by end users. I...
Performance Study of Interweave Spectrum Sharing Method in Cognitive Radio
Spectrum scarcity is one of the most critical recent problems in the field of wireless communication. One of the promising approaches to resolve this issue is the use of Cognitive Radio technique. CR technique is p...
Intrusion Detection Based Security Solution for Cluster Based WSN
Wireless sensor network (WSN) can provide low cost solution to variety of real-world problems. Sensors are low cost tiny devices with limited storage, computational capability and power. they can be deployed in...
FPGA Implementation of an Advanced Traffic Light Controller using Verilog HDL
Traffic lights are the signaling devices used to manage traffic on multi-way road. These are positioned to control the competing flow of the traffic at the road intersections to avoid collisions. By displaying ligh...
A Tailored Ontology Sculpt For Web Information Congregation
As a sculpt for acquaintance explanation and exemplification, ontologies are extensively used to symbolize consumer profiles in tailored web information congregation. Conversely, when representing consumer profiles...