A New Model for Intrusion Detection based on Reduced Error Pruning Technique

Full Text (PDF, 313KB), PP.51-57

Views: 0 Downloads: 0

Author(s)

Mradul Dhakar 1,* Akhilesh Tiwari 1

1. Department of CSE & IT, Madhav Institute of Technology and Science, Gwalior (M.P.), India

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2013.11.07

Received: 22 Jan. 2013 / Revised: 2 May 2013 / Accepted: 25 Jul. 2013 / Published: 8 Sep. 2013

Index Terms

Data mining, intrusion detection, REP, K2, KDDCup’99

Abstract

The increasing counterfeit of the internet usage has raised concerns of the security agencies to work very hard in order to diminish the presence of the abnormal users from the web. The motive of these illicit users (called intruders) is to harm the system or the network either by gaining access to the system or prohibiting genuine users to access the resources. Hence in order to tackle the abnormalities Intrusion Detection System (IDS) with Data Mining has evolved as the most demanding approach. On the one end IDS aims to detect the intrusions by monitoring a given environment while on the other end Data Mining allows mining of these intrusions hidden among genuine users. In this regard, IDS with Data Mining has been through several revisions in consideration to meet the current requirements with efficient detection of intrusions. Also several models have been proposed for enhancing the system performance. In context to improved performance, the paper presents a new model for intrusion detection. This improved model, named as REP (Reduced Error Pruning) based Intrusion Detection Model results in higher accuracy along with the increased number of correctly classified instances.

Cite This Paper

Mradul Dhakar, Akhilesh Tiwari, "A New Model for Intrusion Detection based on Reduced Error Pruning Technique", International Journal of Computer Network and Information Security(IJCNIS), vol.5, no.11, pp.51-57, 2013. DOI:10.5815/ijcnis.2013.11.07

Reference

[1]Changxin Song, Ke Ma, “Design of Intrusion Detection System Based on Data Mining Algorithm,” Proceedings of 2009 International Conference on Signal Processing Systems, IEEE 2009, pp. 307-373.
[2]Yogendra Kumar Jain and Upendra, “An Efficient Intrusion Detection based on Decision Tree Classifier Using Feature Reduction,” International Journal of Scientific and Research Publication, Volume 2, Issue 1, pp. 1-6, January 2012.
[3]Manikandan R, Oviya P and Hemalatha C, “A New Data Mining Based Network Intrusion Detection Model,” Journal of Computer Application, Volume 5, Issue EICA2012-1, pp. 1-10 February 10, 2012.
[4]Daejoon Joo, Taeho Hong and Ingoo Han, “The neural network models for IDS based on the asymmetric costs of false negative errors and false positive errors,” Expert System with Applications 25, 2003, pp.69-75.
[5]Wenke Lee and Salvatore J.Stolfo, “Data Mining Approaches for Intrusion Detection,” Proceedings of the 7th USENIX Security Symposium San Antonio, Texas, January 26-29, 1998.
[6]Evelina Lamma, Fabrizio Riguzzi and Sergio Storari, “Improving the K2 Algorithm Using Association Rule Parameters,” Elsevier Publications, 2005, pp. 1-11.
[7]Tapio Elomaa and Matti Kääriäinen, “An analysis of Reduced Error Pruning,” Journal of Atificial Intelligence Research 15, 2001, pp. 163-187.
[8]Johannes Fürnkranz, “Pruning Algorithms for Rule Learning,” Machine Learning 27 Kluwer Academic Publishers, 1997, pp. 139-172.
[9]KDD Cup 1999 Data, Information and Computer Science, University of California, Irvine. http://kdd.ics.uci.edddatabases/kddcup99/kddcup99.html.
[10]Hesham Altwaijry and Saeed Algarny, “Bayesian based intrusion detection system,” Journal of King Saud University – Computer and Information Sciences 24, 2012, pp. 1-6.