Nazmul Shahadat, Imam Hossain, A. Rohman, Nawshi Matin
{"title":"数据挖掘在特征约简入侵检测中的应用实验分析","authors":"Nazmul Shahadat, Imam Hossain, A. Rohman, Nawshi Matin","doi":"10.1109/ECACE.2017.7912907","DOIUrl":null,"url":null,"abstract":"As tremendous growth of information in the internet, the importance of Network security also dramatically increases. Network and Host based Intrusion Detection System (IDS) are two primary systems in Network Security infrastructure. When new intrusion types are appeared in Network or Host, some serious problems are also appeared to detect these new intrusions. Due to this reason, IDSs demanded better than Signature based detection. The action of intrusion is represented by some features and collects the corresponding featured data from these uncertain feature characteristics. In last two decades, several techniques are developed to detect intrusion by using these data as human labeling which is very time consuming and expensive process. In this paper, we proposed a data mining rule based algorithm called Decision Table (DT) to detect intrusion and a new feature selection process to remove irrelevant/correlated features simultaneously. An empirical analysis on KDD'99 cup dataset was performed by using our proposed and some other existence feature selection techniques with DT and some others classification algorithms. The experimental results showed that proposed approach provides better performance in accuracy and cost compared among Bayesian Network, Naïve Bayes Classifier and other developed algorithms with data mining KDD'99 cup challenge in all cases.","PeriodicalId":333370,"journal":{"name":"2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":"{\"title\":\"Experimental analysis of data mining application for intrusion detection with feature reduction\",\"authors\":\"Nazmul Shahadat, Imam Hossain, A. Rohman, Nawshi Matin\",\"doi\":\"10.1109/ECACE.2017.7912907\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As tremendous growth of information in the internet, the importance of Network security also dramatically increases. Network and Host based Intrusion Detection System (IDS) are two primary systems in Network Security infrastructure. When new intrusion types are appeared in Network or Host, some serious problems are also appeared to detect these new intrusions. Due to this reason, IDSs demanded better than Signature based detection. The action of intrusion is represented by some features and collects the corresponding featured data from these uncertain feature characteristics. In last two decades, several techniques are developed to detect intrusion by using these data as human labeling which is very time consuming and expensive process. In this paper, we proposed a data mining rule based algorithm called Decision Table (DT) to detect intrusion and a new feature selection process to remove irrelevant/correlated features simultaneously. An empirical analysis on KDD'99 cup dataset was performed by using our proposed and some other existence feature selection techniques with DT and some others classification algorithms. The experimental results showed that proposed approach provides better performance in accuracy and cost compared among Bayesian Network, Naïve Bayes Classifier and other developed algorithms with data mining KDD'99 cup challenge in all cases.\",\"PeriodicalId\":333370,\"journal\":{\"name\":\"2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"13\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ECACE.2017.7912907\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ECACE.2017.7912907","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Experimental analysis of data mining application for intrusion detection with feature reduction
As tremendous growth of information in the internet, the importance of Network security also dramatically increases. Network and Host based Intrusion Detection System (IDS) are two primary systems in Network Security infrastructure. When new intrusion types are appeared in Network or Host, some serious problems are also appeared to detect these new intrusions. Due to this reason, IDSs demanded better than Signature based detection. The action of intrusion is represented by some features and collects the corresponding featured data from these uncertain feature characteristics. In last two decades, several techniques are developed to detect intrusion by using these data as human labeling which is very time consuming and expensive process. In this paper, we proposed a data mining rule based algorithm called Decision Table (DT) to detect intrusion and a new feature selection process to remove irrelevant/correlated features simultaneously. An empirical analysis on KDD'99 cup dataset was performed by using our proposed and some other existence feature selection techniques with DT and some others classification algorithms. The experimental results showed that proposed approach provides better performance in accuracy and cost compared among Bayesian Network, Naïve Bayes Classifier and other developed algorithms with data mining KDD'99 cup challenge in all cases.