Open Access Journal

ISSN : 2394 - 6849 (Online)

International Journal of Engineering Research in Electronics and Communication Engineering(IJERECE)

Monthly Journal for Electronics and Communication Engineering

Open Access Journal

International Journal of Engineering Research in Electronics and Communication Engineering(IJERECE)

Monthly Journal for Electronics and Communication Engineering

ISSN : 2394-6849 (Online)

Intrusion Detection Using Efficient Swarm Intelligence

Author : A Shriya 1 B Harshitha 2 K Archana 3 B.Sujatha 4

Date of Publication :7th August 2016

Abstract: In the current age Intrusion detection is an interest in and challenging area. As there are now a few exploration works are as of now done and the outcome change is in advancement. In this dissertation a hybrid approach has been proposed which is based on association rule mining and Intrusion Detection Using Swarm Intelligence Based on Iterative Selection. The NSL-KDD dataset is used. First normal and attack nodes are separated. Then normal node is checked for suspicious behavior. Then association rule mining is applied to form the associated for the next preprocessing. Then we check the threshold value obtained for the different intrusion types. If it is passed the threshold velocity assigned, then it will be categorized as the specific attack. We have considered a Denial of Service (DoS), User to Root (U2R), Remote to User (R2L) and Probing (Probe) attacks in this research work. The results show the improvement in detection as compared to the previous method.

Reference :

  1. 1) Alexander O. Tarakanov, Sergei V. Kvachev, Alexander V. Sukhorukov ,” A Formal Immune Network and ItsnImplementation for On-line Intrusion Detection”, Lecture Notes in Computer Science Volume 3685, pp 394-405, 2005

    2) Ranjna Patel, Deepa Bakhshi and Tripti Arjariya,“Random Particle Swarm Optimization (RPSO) based Intrusion Detection System " , International Journal of Advanced Technology and Engineering Exploration (IJATEE), Volume-2, Issue-5, April-2015 ,pp.60-66.

    3) Meng Jianliang,Shang Haikun,Bian Ling,” The Application on Intrusion Detection Based on Kmeans Cluster Algorithm”, International Forum on Information Technology and Applications, 2009.

    4) Lundin, E. and Jonsson, E. “Survey of research in the intrusion detection area”, Technical Report, Department of Computer Engineering, Chalmers University of Technology, Göteborg, Sweden. January 2002.

    5) R.Venkatesan, R. Ganesan, A. Arul Lawrence Selvakumar, " A Comprehensive Study in Data Mining Frameworks for Intrusion Detection " , International Journal of Advanced Computer Research (IJACR), Volume-2, Issue-7, December2012 ,pp.29-34.

    6) S.Devaraju, S.Ramakrishnan:,”Analysis of Intrusion Detection System Using Various Neural Network classifiers, IEEE 2011.

    7) Moriteru Ishida, Hiroki Takakura and Yasuo Okabe,” High-Performance Intrusion Detection Using OptiGrid Clustering and Grid-based Labelling”, IEEE/IPSJ International Symposium on Applications and the Internet, 2011

    8) S. T. Brugger, “Data mining methods for network intrusion detection”,pp. 1-65, 2004.

    9) W. Lee, S. J. Stolfo, “Data Mining Approaches for Intrusion Detection”,Proceedings of the 1998 USENIX Security Symposium, 1998.

    10) Kamini Nalavade, B.B. Meshram, “Mining Association Rules to Evade Network Intrusion in Network Audit Data International Journal of Advanced Computer Research (IJACR), Volume4, Issue-15, June-2014 ,pp.560-567.

    11) W. Lee, S. J. Stolfo, “Data mining approaches for intrusion detection” Proc. of the 7th USENIX Security Symp.. San Antonio, TX, 1998.

    12) Reyadh Naoum, Shatha Aziz, Firas Alabsi, “An Enhancement of the Replacement Steady State Genetic Algorithm for Intrusion Detection”, International Journal of Advanced Computer Research (IJACR), Volume-4, Issue-15, June-2014, pp.487-493.

    13) Aditya Shrivastava, Mukesh Baghel, Hitesh Gupta, " Review of Intrusion Detection Technique by Soft Computing and Data Mining Approach " , International Journal of Advanced Computer Research (IJACR), Volume-3, Issue-12, September-2013 ,pp.224-228.

    14) LI Yin–huan , “Design of Intrusion Detection Model Based on Data Mining Technology”, International Conference on Industrial Control and Electronics Engineering, 2012.

    15) P. Prasenna, R. Krishna Kumar, A.V.T Raghav Ramana and A. Devanbu “Network Programming And Mining Classifier For Intrusion Detection Using Probability Classification”, Pattern Recognition, Informatics and Medical Engineering, March 21-23, 2012.

    16) LI Han, ”Using a Dynamic K-means Algorithm to Detect Anomaly Activities”, Seventh International a. Conference on Computational Intelligence and Security, 2011.


Recent Article