Mining Association Rules to Evade Network Intrusion in Network Audit Data
Journal: International Journal of Advanced Computer Research (IJACR) (Vol.4, No. 15)Publication Date: 2014-06-17
Authors : Kamini Nalavade; B.B. Meshram;
Page : 560-567
Keywords : Intrusion; Security; Association rule mining; Network; Data mining.;
Abstract
With the growth of hacking and exploiting tools and invention of new ways of intrusion, intrusion detection and prevention is becoming the major challenge in the world of network security. The increasing network traffic and data on Internet is making this task more demanding. There are various approaches being utilized in intrusion detections, but unfortunately any of the systems so far is not completely flawless. The false positive rates make it extremely hard to analyse and react to attacks. Intrusion detection systems using data mining approaches make it possible to search patterns and rules in large amount of audit data. In this paper, we represent a model to integrate association rules to intrusion detection to design and implement a network intrusion detection system. Our technique is used to generate attack rules that will detect the attacks in network audit data using anomaly detection. This shows that the modified association rules algorithm is capable of detecting network intrusions. The KDD dataset which is freely available online is used for our experimentation and results are compared. Our intrusion detection system using association rule mining is able to generate attack rules that will detect the attacks in network audit data using anomaly detection, while maintaining a low false positive rate.
Other Latest Articles
- Utilization of Competitive Intelligence to Enhance Firm Performance: A Case of South African Small and Medium Enterprises
- Representative and Diverse Image Set Gathering for Geographic Area and its Surrounding Region
- An Efficient Automated English to Bengali Script Conversion Mechanism
- Image Processing Algorithms ? A Comprehensive Study
- Printed Text Character Analysis Version-I: Optical Character Recognition with the new User Training Mechanism
Last modified: 2014-12-17 17:08:19