Skip to main content

Experimentation of Data Mining Technique for System’s Security: A Comparative Study

  • Conference paper
Advances in Swarm Intelligence (ICSI 2013)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 7929))

Included in the following conference series:

Abstract

Given the increasing number of users of computer systems and networks, it is difficult to know the profile of the latter and therefore the intrusion has become a highly prized of community of network security. In this paper to address the issues mentioned above, we used the data mining techniques namely association rules, decision trees and Bayesian networks. The results obtained on the KDD’99 benchmark has been validated by several evaluation measures, and are promising and provide access to other techniques and hybridization to improve the security and confidentiality in the field.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Denning, D.E., Neumann, P.G.: Requirements and model for IDES-A real-time intrusion detection system. Comput. Sci. Lab, SRI International, Menlo Park, CA, Tech. Rep. (1985)

    Google Scholar 

  2. Balasubramaniyan, J.S., Garcia-Fernandez, J.O., Isacoff, D., Spafford, E., Zamboni, D., Zamboni, D.: An architecture for intrusion detection using autonomous agents. In: 14th Annual Computer Security Applications Conference (ACSAC 1998), December 7-11. IEEE Computer Society, Scottsdale (1998) ISBN 0-8186-8789-4

    Google Scholar 

  3. Debar, H., Dacier, M., Wespi, A.: Towards a taxonomy of intrusiondetection systems. Computer Networks 31(8), 805–822 (1999)

    Article  Google Scholar 

  4. Anderson, D., Lunt, T.F., Javitz, H., Tamaru, A., Valdes, A.: Detecting unusual program behavior using the statistical component of the nextgeneration intrusion detection system (NIDES). Technical Report SRI-CSL-95-06, Computer Science Laboratory, SRI International, Menlo Park, CA, USA (May 1995)

    Google Scholar 

  5. Axelsson, S.: Intrusion detection systems: a survey and taxonomy, rapport de recherche (2000)

    Google Scholar 

  6. Cooper, G.F.: Computational complexity of probabilistic inference using bayesian belief networks. Artificial Intelligence 42, 393–405 (1990)

    Article  MathSciNet  MATH  Google Scholar 

  7. Dougherty, J., Kohavi, R., Sahami, M.: Forrests of fuzzy decision trees. In: Proceedings of ICML 1995: Supervised and Unsupervised Discretization of Continuous Features, pp. 194–202 (1995)

    Google Scholar 

  8. Duda, R.O., Hart, P.E., Stork, D.G.: Pattern classification. Hardcover (2000)

    Google Scholar 

  9. Esposito, F., Malerba, D., Semeraro, G.: A comparative analysis of methods for pruning decision trees. IEEE Pattern Analysis and Machine Intelligence 19, 476–491 (1997)

    Article  Google Scholar 

  10. Fayyad, U.M., Irani, K.B.: On the handling of continuous-valued attributes in decision tree generation. Machine Learning 8, 87–102 (1992)

    MATH  Google Scholar 

  11. Hamou, R.M., Lehireche, A., Lokbani, A.C., Rahmani, M.: Representation of textual documents by the approach wordnet and n-grams for the unsupervised classifcation (clustering) with 2D cellular automata:a comparative study. Journal of Computer and Information Science 3(3), 240–255 (2010) ISSN 1913-8989 E-ISSN 1913-8997

    Google Scholar 

  12. Hamou, R.M., Abdelmalek, A., Mohamed, R.: Visualization and clustering by 3D cellular automata: Application to unstructured data. International Journal Of Data Mining And Emerging Technologies 2(1) (2012) Print ISSN : 2249-3212. Online ISSN : 2249-3220

    Google Scholar 

  13. Hamou, R.M., Amine, A., Rahmani, M.: A new biomimetic approach based on social spiders for clustering of text. In: Lee, R. (ed.) Software Engineering Research, Management and Appl. 2012. SCI, vol. 430, pp. 17–30. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  14. Friedman, N., Goldszmidt, M.: Building classifiers using bayesian networks. In: Proceedings of the American Association for Artificial Intelligence Conference, AAAI 1996 (1996)

    Google Scholar 

  15. Furnkranz, J.: Pruning algorithms for rule learning. Machine Learning 27, 139–171 (1997)

    Article  Google Scholar 

  16. Hamou, R.M., Lehireche, A., Lokbani, A.C., Rahmani, M.: Text Clustering by 2D Cellular Automata Based on the N-Grams. In: 1st International Symposiums on Cryptography, Network Security, Data Mining and Knowledge Discovery, E-Commerce and its Applications, October 22-24. IEEE, Qinhuangdao (2010)

    Google Scholar 

  17. Ilgun, K., Kemmerer, R.A., Porras, P.A.: Probability propagation. IEEE Transactions on Software Engineering 21(3), 181–199 (1995)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lokbani, A.C., Lehireche, A., Hamou, R.M. (2013). Experimentation of Data Mining Technique for System’s Security: A Comparative Study. In: Tan, Y., Shi, Y., Mo, H. (eds) Advances in Swarm Intelligence. ICSI 2013. Lecture Notes in Computer Science, vol 7929. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38715-9_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-38715-9_30

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-38714-2

  • Online ISBN: 978-3-642-38715-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics