Advertisement

Systematic Literature Survey on IDS Based on Data Mining

  • C. Amali PushpamEmail author
  • J. Gnana Jayanthi
Conference paper
  • 190 Downloads
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 44)

Abstract

In this digital era, the usage of internet and information grows rapidly. Every fraction of second, huge volume of data is transferred from one network to another. This information and information system are subjected to attack. It is necessary to protect this valuable information and network from intruders generally named as crackers or hackers who are threat to system security. System security is a common, current and critical problem which is a challengeable task to researchers. Intrusion Detection System (IDS) offers good solution to this problem. With aim of boost up the performance of IDS, it is integrated with data mining. Various data mining techniques in IDS, based on certain metrics like accuracy, false alarm rate, detection rate and issues of IDS have been analyzed in this paper. A total of 43 papers were reviewed in the period 2008 to 2018. It is observed that more number of articles support SVM or ANN Techniques. Also it is observed that hybrid methods produce better performance than single. This survey shows that in hybrid methods, frequently K-means or SVM technique are combined with others and gives good result.

Keywords

Intrusion Attack Data mining Intruders Security 

Notes

Acknowledgements

I sincerely thank my Guide Professor Dr. J. Gnana Jayanthi for her guidance and support given.

References

  1. 1.
    Kavitha, N., Boaz, B.: A survey on intrusion detection system using data mining techniques. Int. J. Innov. Res. Sci. Eng. Technol. (IJIRSET) 6(Special Issue 11), 460–465 (2017). e-ISSN: 2319-8753Google Scholar
  2. 2.
    Josemila Baby, J., Jeba, J.R.: Survey paper on various hybrid and anomaly based network intrusion detection system. Res. J. Appl. Sci. 12(3–4), 304–310 (2017). ISSN: 1815-932XGoogle Scholar
  3. 3.
    Yeo, L.H., Che, X., Lakkaraju, S.: Understanding Modern Intrusion Detection Systems: A Survey, Nov 2017. arXiv:1708.07174 [cs.CR]
  4. 4.
    Baravati, H.B., et al.: A new data mining-based approach to improving the quality of alerts in intrusion detection systems. Int. J. Comput. Sci. Netw. Secur. (IJCSNS) 17(8), 194–198 (2017)Google Scholar
  5. 5.
    Liu, W.: Research of Data mining in Intrusion Detection System and the Uncertainty of the Attack. In: ISBN: 978-1-4244-5273-6/09/$26.00 ©2009 IEEEGoogle Scholar
  6. 6.
    Chaudhari, R.R., Patil, S.P.: A study on data mining & machine learning for intrusion detection system. Int. J. Adv. Res. Comput. Commun. Eng. (IJARCCE) 6(2), 114–118 (2017)Google Scholar
  7. 7.
    Agrawal, S., Jain, G.: A review on intrusion detection system based data mining techniques. Int. Res. J. Eng. Technol (IRJET) 04(09), 402–407 (2017). e-ISSN: 2395-0056Google Scholar
  8. 8.
    Chaudhari, R.R., Patil, S.P.: Intrusion detection system: classification, techniques and datasets to implement. Int. Res. J. Eng. Technol. (IRJET) 04(02), 1860–1866 (2017). e-ISSN: 2395-0056Google Scholar
  9. 9.
    Kumarl, S., Yadav, A.: Increasing performance of intrusion detection system using neural network. In: The Proceedings of the IEEE International Conference on Advanced Communication Control and Computing Technologies (ICACCCT), India, pp. 546–550 (2014). ISBN No. 978-1-4799-3914-5/2014Google Scholar
  10. 10.
    Mewada, A., Gedam, P., Khan, S., Reddy, M.U.: Network intrusion detection using multiclass support vector machine. Spec. Issue IJCCT 1(2–4), 172–175 (2010)Google Scholar
  11. 11.
    Tang, Y., Krasser, S., He, Y., Yang, W., Alperovitch, D.: Support vector machines and random forests modeling for spam senders behavior analysis. In: Proceedings of IEEE Global Communications Conference (IEEE GLOBECOM 2008), Computer and Communications Network Security Symposium, New Orleans, pp. 1–5 (2008)Google Scholar
  12. 12.
    Singh, V., et al.: Intrusion detection system using data mining a review. In: Proceeding of 2016 International Conference on Global Trends in Signal Processing, Information Computing and Communication, pp. 587–592. IEEE, Piscataway (2016). ISBN: 978-1-5090-0467-6/16Google Scholar
  13. 13.
    Sawant, T.S. Itkar, S.A.: A survey and comparative study of different data mining techniques for implementation of intrusion detection system. Int. J. Curr. Eng. Technol (IJCET) 4(3), 1288–129 (2014). e-ISSN 2277 – 4106Google Scholar
  14. 14.
    Eid, H.F., Darwish, A., Hassanien, A.E., Abraham, A.: Principle components analysis and support vector machine based intrusion detection system. In: The 10th International Conference on Intelligent Systems Design and Applications, Cairo, pp. 363–367 (2010)Google Scholar
  15. 15.
    Latha, S., Prakash, S.J.: A survey on network attacks and intrusion detection systems. In: International Conference on Advanced Computing and Communication Systems (ICACCS-2017), Coimbatore, India, 06–07 Jan 2017. ISBN: 978-1-5090-4559-4Google Scholar
  16. 16.
    Chauhan, A., et al.: Survey on data mining techniques in intrusion detection. Int. J. Sci. Eng. Res. 2(7), 1–4 (2011)Google Scholar
  17. 17.
    Yusufovna, S.F.: Integrating intrusion detection system and data mining. In: International Symposium on Ubiquitous Multimedia Computing, Uzbekistan, pp. 256–259 (2008). ISBN: 978-0-7695-3427-5Google Scholar
  18. 18.
    Wankhade, K., et al.: An overview of intrusion detection based on data mining techniques. In: International Conference on Communication Systems and Network Technologies, pp: 626–629 (2013). ISBN : 978-0-7695-4958-3Google Scholar
  19. 19.
    El Moussaid, N.: Overview of Intrusion Detection Using Data-Mining and the Features Selection, Morocco (2014). ISBN : 978-1-4799-3824-7Google Scholar
  20. 20.
    Abdullah, A., et al.: Data mining approaches on network data: intrusion detection system. Int. J. Adv. Res. Comput. Sci. (IJARCS) 8(1), 316–319 (2017)Google Scholar
  21. 21.
    Jain, N., Srivastava, V.: Data mining techniques: a survey paper. Int. J. Res. Eng. Technol. (IJRET) 02(11), 116–119 (2013). e-ISSN: 2319-1163Google Scholar
  22. 22.
    Ramageri, B.M.: Data mining techniques and applications. Indian J. Comput. Sci. Eng. (IJCSE) 1(4), 301–305 (2010). ISSN: 0976-5166Google Scholar
  23. 23.
    Desale, K.S., et al.: Efficient intrusion detection system using stream data mining classification technique. In: Proceeding of 2015 International Conference on Computing Communication Control and Automation, 469–473. IEEE, Piscataway (2015). ISBN: 978-1-4799-6892-3/15Google Scholar
  24. 24.
    Chaturvedi, P., Saxena, A.: A systematic literature survey on IDS. Int. J. Recent Innov. Trends Comput. Commun. (IJRITCC) 5(6), 671–676 (2017). ISSN: 2321-8169Google Scholar
  25. 25.
    Subramanian, U., Ong, H.S.: Systematic review and comparison of anomaly based network intrusion detection systems based on efficiency. J. Emerg. Trends Comput. Inf. Sci. 4(11), 844–851 (2013). ISSN 2079-8407Google Scholar
  26. 26.
    Goeschel, K.: Reducing False Positives In Intrusion Detection Systems Using Data-Mining Techniques Utilizing Support Vector Machines, Decision Trees, and Naïve Bayes for Off-Line Analysis. ISBN : 978-1-5090-2246-5/16/$31.00 ©2016 IEEEGoogle Scholar
  27. 27.
    Pan, S.: Developing a hybrid intrusion detection system using data mining for power systems. In: IEEE Transactions on Smart Grid, 1–10. IEEE, Piscataway (2015). ISSN : 1949-3053_cGoogle Scholar
  28. 28.
    Zhu, M., et al.: Intrusion Detection System Based on data mining for Host Log, pp. 1742–1746. IEEE, Piscataway (2017). ISBN : 978-1-4673-8979-2/17/Google Scholar
  29. 29.
    Zhao, Y., et al.: Realization of intrusion detection system based on the improved data mining technology. In: Proceeding of the 8th International Conference on Computer Science & Education (ICCSE 2013), Colombo, Sri Lanka, pp. 982–987, 26–28 Apr 2013Google Scholar
  30. 30.
    Kezih, M. et al.: Evaluation effectiveness of intrusion detection system with reduced dimension using data mining classification tools. In: Proceeding of 2nd International Conference on Systems and Computer Science (ICSCS), Villeneuve d’Ascq, France, 26–27 Aug 2013Google Scholar
  31. 31.
    Mahapatra, B., et al.: Self adaptive intrusion detection technique using data mining concept in an Ad-Hoc network. In: Proceeding of 2nd International Conference on Intelligent Computing, Communication & Convergence (ICCC-2016). Procedia Computer Science, vol. 92, pp. 292–297 (2016)Google Scholar
  32. 32.
    Mohammed, M.N., Sulaiman, N.: Intrusion Detection System Based on SVM for WLAN, pp. 313–317. Published by Elsevier Ltd, Malaysia (2012). ISSN: 2212-0173 © 2012Google Scholar
  33. 33.
    Farnaaz, N., Jabbar, M.A.: Random forest modeling for network intrusion detection system. In: The Proceedings of the Twelfth International Multi-Conference on Information Processing-2016 (IMCIP-2016), vol. 89, pp. 213–217. Published by Elsevier, India (2016). ISSN : 1877-0509Google Scholar
  34. 34.
    Hasan, M.A.M., Nasser, M., Pal, B., Ahmad, S.: Support vector machine and random forest modeling for intrusion detection system (IDS). J. Intell. Learn. Syst. Appl. 6, 45–52 (2014)Google Scholar
  35. 35.
    Ravale, U., Marathe, N., Padiya, P.: Feature selection based hybrid anomaly intrusion detection system using K means and RBF Kernel function. In: International Conference on Advanced Computing Technologies and Applications (ICACTA-2015), vol. 45, pp. 428–435. The Journal Published by Elsevier (2015). ISSN: 1877-0509Google Scholar
  36. 36.
    Jianliang, M., Haikun, S., Ling, B.: The application on intrusion detection based on k-means cluster algorithm. In: International Forum on Information Technology and Application, pp. 150–152. IEEE, Piscataway (2009)Google Scholar
  37. 37.
    Somwang, P., Lilakiatsakun, W.: Computer network security based on support vector machine approach. In: 11th International Conference on “Control, Automation and Systems (2011)Google Scholar
  38. 38.
    Xie, Y., Zhang, Y.: An intelligent anomaly analysis for intrusion detection based on SVM. In: International Conference on Computer Science and Information Processing (CSIP), pp. 739–742. IEEE, Piscataway (2012)Google Scholar
  39. 39.
    Tiwari, S.K., Sharma, S.K., Pande, P., Sisodia, M.S.: An improved network intrusion detection technique based on k-means clustering via naïve bayes classification. In: International Conference on Advances in Engineering, Science and Management (ICAESM) (2012)Google Scholar
  40. 40.
    Al Amrani, Y., Lazaar, M., El Kadiri, K.E.: Random forest and support vector machine based hybrid approach to sentiment analysis. In: The First International Conference on Intelligent Computing in Data Sciences, vol. 127, pp. 511–520. Published by Elsevier B.V., Morocco (2018). ISSN : 1877-0509Google Scholar
  41. 41.
    Belavagi, M.C., Muniyal, B.: Performance evaluation of supervised machine learning algorithms for intrusion detection”, In the Twelfth International Multi-Conference on Information Processing-2016 (IMCIP-2016), Procedia Computer Science, vol. 89, pp. 117–123. Published by Elsevier B.V. (2016). ISSN : 1877-0509Google Scholar
  42. 42.
    Zaman, S., Karray, F.: Feature selection for intrusion detection system based on support vector machine. In: 6th Annual IEEE Consumer Communications & Networking Conference IEEE CCNC (2009)Google Scholar
  43. 43.
    Kukielka, P., Kotulski, Z., Analysis of the different architectures of neural networks usage for Intrusion Detection Systems. In: Proceedings of the International Multiconference on Computer Science and Information Technology, IMCSIT 2008, pp. 807–811. IEEEXplore (2008)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Rajah Serfoji CollegeThanjavurIndia
  2. 2.Department of Computer ScienceRajah Serfoji CollegeThanjavurIndia

Personalised recommendations