Skip to main content

Hybrid Technique Based on DBSCAN for Selection of Improved Features for Intrusion Detection System

  • Conference paper
  • First Online:
Emerging Trends in Expert Applications and Security

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 841))

Abstract

Data mining is the taking out of concealed data from enormous databases (DBs); it is an effective innovation with unusual probable to enable associations to deliberate on the mainly imperative data in their data warehouses. IDS are the chief issue of the security which is helpful in everyday life to avoid the data from the attackers. Data mining includes numerous methods for the detection of intrusion which involves the detection of all harmful activities. In our proposed work, we initially apply KDD cup’99 dataset which is most broadly used method for detecting intrusion. DBSCAN is the most utilized method which is used to eliminate noise from the data. Then, we generate the most meaning inputs by analyzing and processing whole data which is done by the selection of feature method. K-means clustering performs grouping of data which is followed by SMO classifier. So we proposed a hybrid structure which improves the taken as a whole accuracy. MATLAB and WEKA tools are used to execute the whole process.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Padhy N, Mishra P, Panigrahi R (2012) The survey of data mining applications and feature scope, vol 2, No 3, June 2012. https://doi.org/10.5121/ijcseit.2012.2303

    Article  Google Scholar 

  2. Umamaheswari K, Niraimathi S (2013) A study on student data analysis using data mining techniques. Int J Adv Res Comput Sci Soft Eng 3(8)

    Google Scholar 

  3. Industry Application of data mining. http://www.pearsonhighered.com/samplechapter/0130862711.pdf

  4. Olson DL, Delen D (2008) Advanced data mining techniques. Springer

    Google Scholar 

  5. Otari GV, Kulkarni RV (2012) A review of application of data mining in earthquake prediction GV Otari et al/(IJCSIT). Int J Comput Sci Inf Technol 3(2):3570–3574

    Google Scholar 

  6. Ramesh D, Vardhan BV (2013) Data mining techniques and applications to agricultural yield data. Int J Adv Res Comput Commun Eng 2(9)

    Google Scholar 

  7. Petre R-Ĺž (2012) Data mining in cloud computing. Database Syst J III(3)

    Google Scholar 

  8. Jaiganesh V, Mangayarkarasi S, Sumathi P (2013) Intrusion detection systems: a survey and analysis of classification techniques. Int J Adv Res Comput Commun Eng 2(4). ISSN (Print): 2319–5940

    Google Scholar 

  9. Tyagi R, Jawdekar A (2016) An advanced recommendation system for e-commerce users, 978-1-5090-0669-4/16/$31.00 © 2016 IEEE

    Google Scholar 

  10. Goeschel K (2016) Reducing false positives in intrusion detection systems using data-mining techniques utilizing support vector machines, Decision Trees, And Naïve Bayes For Off-Line Analysis, 978-1-5090-2246-5/16/$31.00 © 2016 IEEE

    Google Scholar 

  11. Gaied I, Jemili F, Korbaa O (2015) Intrusion detection based on neuro-fuzzy classification, 978-1-5090-0478-2/15/$31.00 © 2015 IEEE

    Google Scholar 

  12. Ait Tchakoucht T, Ezziyy Ani M, Jbilou M, Salaun M (2015) Behavioral approach for intrusion detection, 978-1-5090-0478-2/15/$31.00 © 2015 IEEE

    Google Scholar 

  13. Alseiari FAA, Aung Z (2015) Real-Time anomaly-based distributed intrusion detection systems for advanced metering infrastructure utilizing stream data mining, 978-1-4673-8734-7/15/$31.00 ©2015 IEEE

    Google Scholar 

  14. Desale KS, Kumathekar CN, Chavan AP (2015) Efficient Intrusion Detection System using Stream Data Mining Classification Technique, https://doi.org/10.1109/iccubea.2015.98, 978-1-4799-6892-3/15 $31.00 © 2015 IEEE

  15. Elekar KS (2015) Combination of data mining techniques for intrusion detection system. In: IEEE International Conference on Computer, Communication and Control (IC4-2015)

    Google Scholar 

  16. Leu Fang-Yie, Tsai Kun-Lin, Hsiao Yi-Ting, Yang Chao-Tung (2015) An internal intrusion detection and protection system by using data mining and forensic techniques. Digit Object Identifier. https://doi.org/10.1109/JSYST.2015.2418434IEEE

    Article  Google Scholar 

  17. Ng J, Joshi D, Banik SM (2015) Applying data mining techniques to intrusion detection, https://doi.org/10.1109/itng.2015.146, 978-1-4799-8828-0/15$31.00 © 2015 IEEE

  18. Subaira AS, Anitha P (2014) Efficient classification mechanism for network intrusion detection system based on data mining techniques: a survey, 978-1-4799-3837-7/14/$31.00 © 2014 IEEE

    Google Scholar 

  19. Hasija H, Chaurasia D (2015) Recommender system with web usage mining based on fuzzy C means and neural networks. In: 2015 1st International Conference on Next Generation Computing Technologies (NGCT-2015) Dehradun, India, 4–5 Sept 2015. IEEE

    Google Scholar 

  20. Modi HY, Narvekar M (2015) Enhancement of online web recommendation system using a hybrid clustering and pattern matching approach, 978-1-4799-7263-0/15/$31.00 © 2015 IEEE

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Khushboo Saxena .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Saxena, A., Saxena, K., Goyal, J. (2019). Hybrid Technique Based on DBSCAN for Selection of Improved Features for Intrusion Detection System. In: Rathore, V., Worring, M., Mishra, D., Joshi, A., Maheshwari, S. (eds) Emerging Trends in Expert Applications and Security. Advances in Intelligent Systems and Computing, vol 841. Springer, Singapore. https://doi.org/10.1007/978-981-13-2285-3_43

Download citation

Publish with us

Policies and ethics