Advantages of Hiring UIUX Design Service Providers for Your Business
An improved network intrusion detection technique based on
1. AN IMPROVED NETWORK INTRUSION DETECTION
TECHNIQUE BASED ON K-MEANS CLUSTERING VIA
NAIVE BAYES CLASSIFICATION
YOUSEF EMAMI
Yousef.emami@ieee.org
03/30/16 Data Mining's Presentation,CE&IT Faculty,Shiraz University of Technology 1
3. INTRUSION DETECTION
An Intrusion Detection System (IDS) inspects the activities in a
system for suspicious behaviour or patterns that may indicate
system attack or misuse.
There are two main categories of intrusion detection techniques;
Anomaly detection
Misuse detection
Here ,the performance of K-means clustering and naïve classifier
when trained to identify signature of specific attacks is reviewed.
03/30/16 Data Mining's Presentation,CE&IT Faculty,Shiraz University of Technology 3
4. DATASET DESCRIPTION
The utilized data set is KDD Cup which contained a wide variety of
intrusions simulated in a military network environment
It consisted of approximately 4,900,000 data instances
The simulated attacks fell in one of the following four categories:
DOS-Denial of Service (e.g. a syn flood),
R2L- Unauthorized access from a remote machine (e.g. password
guessing),
U2R-Unauthorized access to super user or root functions (e.g. a buffer
overflow attack)
Probing-surveillance and other probing for vulnerabilities (e.g. port
scanning).
03/30/16 Data Mining's Presentation,CE&IT Faculty,Shiraz University of Technology 4
5. K-MEANS CLUSTERING VIA NAIVE BAYES CLASSIFICATION MODEL
FOR NIDS
03/30/16 Data Mining's Presentation,CE&IT Faculty,Shiraz University of Technology 5
11. Thank you for your kind attention
03/30/16
Data Mining's Presentation,CE&IT Faculty,Shiraz University of
Technology
11
12. REFERENCE
• Sanjay Kumar Sharmai, Pankaj Pande, Susheel Kumar Tiwari and Mahendra Singh Sisodiai,”An Improved Network Intrusion
Detection Technique based on k-Means Clustering via NaIve Bayes Classification”, IEEE-International Conference On
Advances In Engineering, Science And Management (ICAESM -2012) March 30, 31, 2012
03/30/16
Data Mining's Presentation,CE&IT Faculty,Shiraz University of
Technology
12