Abstract
Given the increasing number of users of computer systems and networks, it is difficult to know the profile of the latter and therefore the intrusion has become a highly prized of community of network security. In this paper to address the issues mentioned above, we used the data mining techniques namely association rules, decision trees and Bayesian networks. The results obtained on the KDD’99 benchmark has been validated by several evaluation measures, and are promising and provide access to other techniques and hybridization to improve the security and confidentiality in the field.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Denning, D.E., Neumann, P.G.: Requirements and model for IDES-A real-time intrusion detection system. Comput. Sci. Lab, SRI International, Menlo Park, CA, Tech. Rep. (1985)
Balasubramaniyan, J.S., Garcia-Fernandez, J.O., Isacoff, D., Spafford, E., Zamboni, D., Zamboni, D.: An architecture for intrusion detection using autonomous agents. In: 14th Annual Computer Security Applications Conference (ACSAC 1998), December 7-11. IEEE Computer Society, Scottsdale (1998) ISBN 0-8186-8789-4
Debar, H., Dacier, M., Wespi, A.: Towards a taxonomy of intrusiondetection systems. Computer Networks 31(8), 805–822 (1999)
Anderson, D., Lunt, T.F., Javitz, H., Tamaru, A., Valdes, A.: Detecting unusual program behavior using the statistical component of the nextgeneration intrusion detection system (NIDES). Technical Report SRI-CSL-95-06, Computer Science Laboratory, SRI International, Menlo Park, CA, USA (May 1995)
Axelsson, S.: Intrusion detection systems: a survey and taxonomy, rapport de recherche (2000)
Cooper, G.F.: Computational complexity of probabilistic inference using bayesian belief networks. Artificial Intelligence 42, 393–405 (1990)
Dougherty, J., Kohavi, R., Sahami, M.: Forrests of fuzzy decision trees. In: Proceedings of ICML 1995: Supervised and Unsupervised Discretization of Continuous Features, pp. 194–202 (1995)
Duda, R.O., Hart, P.E., Stork, D.G.: Pattern classification. Hardcover (2000)
Esposito, F., Malerba, D., Semeraro, G.: A comparative analysis of methods for pruning decision trees. IEEE Pattern Analysis and Machine Intelligence 19, 476–491 (1997)
Fayyad, U.M., Irani, K.B.: On the handling of continuous-valued attributes in decision tree generation. Machine Learning 8, 87–102 (1992)
Hamou, R.M., Lehireche, A., Lokbani, A.C., Rahmani, M.: Representation of textual documents by the approach wordnet and n-grams for the unsupervised classifcation (clustering) with 2D cellular automata:a comparative study. Journal of Computer and Information Science 3(3), 240–255 (2010) ISSN 1913-8989 E-ISSN 1913-8997
Hamou, R.M., Abdelmalek, A., Mohamed, R.: Visualization and clustering by 3D cellular automata: Application to unstructured data. International Journal Of Data Mining And Emerging Technologies 2(1) (2012) Print ISSN : 2249-3212. Online ISSN : 2249-3220
Hamou, R.M., Amine, A., Rahmani, M.: A new biomimetic approach based on social spiders for clustering of text. In: Lee, R. (ed.) Software Engineering Research, Management and Appl. 2012. SCI, vol. 430, pp. 17–30. Springer, Heidelberg (2012)
Friedman, N., Goldszmidt, M.: Building classifiers using bayesian networks. In: Proceedings of the American Association for Artificial Intelligence Conference, AAAI 1996 (1996)
Furnkranz, J.: Pruning algorithms for rule learning. Machine Learning 27, 139–171 (1997)
Hamou, R.M., Lehireche, A., Lokbani, A.C., Rahmani, M.: Text Clustering by 2D Cellular Automata Based on the N-Grams. In: 1st International Symposiums on Cryptography, Network Security, Data Mining and Knowledge Discovery, E-Commerce and its Applications, October 22-24. IEEE, Qinhuangdao (2010)
Ilgun, K., Kemmerer, R.A., Porras, P.A.: Probability propagation. IEEE Transactions on Software Engineering 21(3), 181–199 (1995)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lokbani, A.C., Lehireche, A., Hamou, R.M. (2013). Experimentation of Data Mining Technique for System’s Security: A Comparative Study. In: Tan, Y., Shi, Y., Mo, H. (eds) Advances in Swarm Intelligence. ICSI 2013. Lecture Notes in Computer Science, vol 7929. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38715-9_30
Download citation
DOI: https://doi.org/10.1007/978-3-642-38715-9_30
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-38714-2
Online ISBN: 978-3-642-38715-9
eBook Packages: Computer ScienceComputer Science (R0)