Abstract
Data mining is the taking out of concealed data from enormous databases (DBs); it is an effective innovation with unusual probable to enable associations to deliberate on the mainly imperative data in their data warehouses. IDS are the chief issue of the security which is helpful in everyday life to avoid the data from the attackers. Data mining includes numerous methods for the detection of intrusion which involves the detection of all harmful activities. In our proposed work, we initially apply KDD cup’99 dataset which is most broadly used method for detecting intrusion. DBSCAN is the most utilized method which is used to eliminate noise from the data. Then, we generate the most meaning inputs by analyzing and processing whole data which is done by the selection of feature method. K-means clustering performs grouping of data which is followed by SMO classifier. So we proposed a hybrid structure which improves the taken as a whole accuracy. MATLAB and WEKA tools are used to execute the whole process.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Padhy N, Mishra P, Panigrahi R (2012) The survey of data mining applications and feature scope, vol 2, No 3, June 2012. https://doi.org/10.5121/ijcseit.2012.2303
Umamaheswari K, Niraimathi S (2013) A study on student data analysis using data mining techniques. Int J Adv Res Comput Sci Soft Eng 3(8)
Industry Application of data mining. http://www.pearsonhighered.com/samplechapter/0130862711.pdf
Olson DL, Delen D (2008) Advanced data mining techniques. Springer
Otari GV, Kulkarni RV (2012) A review of application of data mining in earthquake prediction GV Otari et al/(IJCSIT). Int J Comput Sci Inf Technol 3(2):3570–3574
Ramesh D, Vardhan BV (2013) Data mining techniques and applications to agricultural yield data. Int J Adv Res Comput Commun Eng 2(9)
Petre R-Ĺž (2012) Data mining in cloud computing. Database Syst J III(3)
Jaiganesh V, Mangayarkarasi S, Sumathi P (2013) Intrusion detection systems: a survey and analysis of classification techniques. Int J Adv Res Comput Commun Eng 2(4). ISSN (Print): 2319–5940
Tyagi R, Jawdekar A (2016) An advanced recommendation system for e-commerce users, 978-1-5090-0669-4/16/$31.00 © 2016 IEEE
Goeschel K (2016) Reducing false positives in intrusion detection systems using data-mining techniques utilizing support vector machines, Decision Trees, And Naïve Bayes For Off-Line Analysis, 978-1-5090-2246-5/16/$31.00 © 2016 IEEE
Gaied I, Jemili F, Korbaa O (2015) Intrusion detection based on neuro-fuzzy classification, 978-1-5090-0478-2/15/$31.00 © 2015 IEEE
Ait Tchakoucht T, Ezziyy Ani M, Jbilou M, Salaun M (2015) Behavioral approach for intrusion detection, 978-1-5090-0478-2/15/$31.00 © 2015 IEEE
Alseiari FAA, Aung Z (2015) Real-Time anomaly-based distributed intrusion detection systems for advanced metering infrastructure utilizing stream data mining, 978-1-4673-8734-7/15/$31.00 ©2015 IEEE
Desale KS, Kumathekar CN, Chavan AP (2015) Efficient Intrusion Detection System using Stream Data Mining Classification Technique, https://doi.org/10.1109/iccubea.2015.98, 978-1-4799-6892-3/15 $31.00 © 2015 IEEE
Elekar KS (2015) Combination of data mining techniques for intrusion detection system. In: IEEE International Conference on Computer, Communication and Control (IC4-2015)
Leu Fang-Yie, Tsai Kun-Lin, Hsiao Yi-Ting, Yang Chao-Tung (2015) An internal intrusion detection and protection system by using data mining and forensic techniques. Digit Object Identifier. https://doi.org/10.1109/JSYST.2015.2418434IEEE
Ng J, Joshi D, Banik SM (2015) Applying data mining techniques to intrusion detection, https://doi.org/10.1109/itng.2015.146, 978-1-4799-8828-0/15$31.00 © 2015 IEEE
Subaira AS, Anitha P (2014) Efficient classification mechanism for network intrusion detection system based on data mining techniques: a survey, 978-1-4799-3837-7/14/$31.00 © 2014 IEEE
Hasija H, Chaurasia D (2015) Recommender system with web usage mining based on fuzzy C means and neural networks. In: 2015 1st International Conference on Next Generation Computing Technologies (NGCT-2015) Dehradun, India, 4–5 Sept 2015. IEEE
Modi HY, Narvekar M (2015) Enhancement of online web recommendation system using a hybrid clustering and pattern matching approach, 978-1-4799-7263-0/15/$31.00 © 2015 IEEE
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Saxena, A., Saxena, K., Goyal, J. (2019). Hybrid Technique Based on DBSCAN for Selection of Improved Features for Intrusion Detection System. In: Rathore, V., Worring, M., Mishra, D., Joshi, A., Maheshwari, S. (eds) Emerging Trends in Expert Applications and Security. Advances in Intelligent Systems and Computing, vol 841. Springer, Singapore. https://doi.org/10.1007/978-981-13-2285-3_43
Download citation
DOI: https://doi.org/10.1007/978-981-13-2285-3_43
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-2284-6
Online ISBN: 978-981-13-2285-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)