Open Access Open Access  Restricted Access Subscription Access

Intrusion Detection System using Outlier Analysis

Umang Gupta, Shikha Gupta, Vandana Bhattacharjee

Abstract


The tremendous advancement and increase in usage of internet have increased the number of intruders and hackers over the years. These cyber-attacks increase in complexity and sophistication day by day, and it is thus proposed that data mining be used to counter them. Data mining is one of the recent technologies suitably applied to intrusion detection to detect the network attacks, to reduce the complexities and to get normal behavioral pattern. In this paper, an outlier analysis model is introduced which can be effectively used for anomaly detection. This paper proposes a neighborhood-based technique for outlier detection, where the Level of Outlierness (LON) of network dataset is measured to detect the outliers, if any.


Full Text:

PDF

References


Singh, D.K. and Swaroop V. Data security and privacy in data mining: research issues & preparation. International Journal of Computer Trends and Technology. 2013.4(2):194-200p.

Hawkins, D.M. Identification of outliers. 1980 (Vol. 11). London: Chapman and Hall.

Chen, Y., Miao, D. and Zhang, H. Neighborhood outlier detection. Expert Systems with Application.2010.37(12):8745-8749p.

Thuraisingham, B., Khan, L., Masud, M.M. and Hamlen, K.W. December. Data mining for security applications. In 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing. 2008.2:585-589p

Gadal, S.M.A.M. and Mokhtar, R.A. January. Anomaly detection approach using hybrid algorithm of data mining technique. In 2017 International Conference on Communication, Control, Computing and Electronics Engineering (ICCCCEE).2017.1-6p.

Vinutha, H.P. and Poornima. July. A Survey- Comparative Study on Intrusion Detection System. International Journal of Advanced Research in Computer and Communication Engineering.2017.4:410-414p.

Qing, Y., Xiaoping, W. and Gaofeng, H. An intrusion detection approach based on data mining. In 2010 2nd International Conference on Future Computer and Communication. 2010.l(1):V1-695p.

Subaira, A.S. and Anitha, P., 2014, January. Efficient classification mechanism for network intrusion detection system based on data mining techniques: a survey. In 2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO).2014.274-280p.

Kshirsagar, S and Yadav S. R., July 2014. A Survey in different Intrusion Techniques and approaches. International Journal of Scientific Research Engineering & Technology (IJSRET),2014.2:742-747p.

Nayak, B.S., 2013. Research on application of intrusion detection system in data mining.


Refbacks

  • There are currently no refbacks.