SlideShare a Scribd company logo
1 of 12
AN IMPROVED NETWORK INTRUSION DETECTION
TECHNIQUE BASED ON K-MEANS CLUSTERING VIA
NAIVE BAYES CLASSIFICATION
YOUSEF EMAMI
Yousef.emami@ieee.org
03/30/16 Data Mining's Presentation,CE&IT Faculty,Shiraz University of Technology 1
AGENDA
Intrusion Detection
Dataset Description
THE PROPOSED MODEL FOR NIDS
EXPERIMENT AND RESULTS
03/30/16 Data Mining's Presentation,CE&IT Faculty,Shiraz University of Technology 2
INTRUSION DETECTION
An Intrusion Detection System (IDS) inspects the activities in a
system for suspicious behaviour or patterns that may indicate
system attack or misuse.
There are two main categories of intrusion detection techniques;
 Anomaly detection
Misuse detection
Here ,the performance of K-means clustering and naïve classifier
when trained to identify signature of specific attacks is reviewed.
03/30/16 Data Mining's Presentation,CE&IT Faculty,Shiraz University of Technology 3
DATASET DESCRIPTION
The utilized data set is KDD Cup which contained a wide variety of
intrusions simulated in a military network environment
It consisted of approximately 4,900,000 data instances
The simulated attacks fell in one of the following four categories:
DOS-Denial of Service (e.g. a syn flood),
R2L- Unauthorized access from a remote machine (e.g. password
guessing),
 U2R-Unauthorized access to super user or root functions (e.g. a buffer
overflow attack)
 Probing-surveillance and other probing for vulnerabilities (e.g. port
scanning).
03/30/16 Data Mining's Presentation,CE&IT Faculty,Shiraz University of Technology 4
K-MEANS CLUSTERING VIA NAIVE BAYES CLASSIFICATION MODEL
FOR NIDS
03/30/16 Data Mining's Presentation,CE&IT Faculty,Shiraz University of Technology 5
Metrics
03/30/16
Data Mining's Presentation,CE&IT Faculty,Shiraz University of
Technology
6
03/30/16 Data Mining's Presentation,CE&IT Faculty,Shiraz University of Technology 7
03/30/16 Data Mining's Presentation,CE&IT Faculty,Shiraz University of Technology 8
03/30/16 Data Mining's Presentation,CE&IT Faculty,Shiraz University of Technology 9
03/30/16
Data Mining's Presentation,CE&IT Faculty,Shiraz University of
Technology
10
Thank you for your kind attention
03/30/16
Data Mining's Presentation,CE&IT Faculty,Shiraz University of
Technology
11
REFERENCE
• Sanjay Kumar Sharmai, Pankaj Pande, Susheel Kumar Tiwari and Mahendra Singh Sisodiai,”An Improved Network Intrusion
Detection Technique based on k-Means Clustering via NaIve Bayes Classification”, IEEE-International Conference On
Advances In Engineering, Science And Management (ICAESM -2012) March 30, 31, 2012
03/30/16
Data Mining's Presentation,CE&IT Faculty,Shiraz University of
Technology
12

More Related Content

Similar to An improved network intrusion detection technique based on

Multipath Dynamic Source Routing Protocol using Portfolio Selection
Multipath Dynamic Source Routing Protocol using Portfolio SelectionMultipath Dynamic Source Routing Protocol using Portfolio Selection
Multipath Dynamic Source Routing Protocol using Portfolio SelectionIRJET Journal
 
IRJET- An Intrusion Detection and Protection System by using Data Mining ...
IRJET-  	  An Intrusion Detection and Protection System by using Data Mining ...IRJET-  	  An Intrusion Detection and Protection System by using Data Mining ...
IRJET- An Intrusion Detection and Protection System by using Data Mining ...IRJET Journal
 
Peripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network SecurityPeripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network SecurityIJRES Journal
 
Current issues - International Journal of Network Security & Its Applications...
Current issues - International Journal of Network Security & Its Applications...Current issues - International Journal of Network Security & Its Applications...
Current issues - International Journal of Network Security & Its Applications...IJNSA Journal
 
A Brief Study on Different Intrusions and Machine Learning-based Anomaly Dete...
A Brief Study on Different Intrusions and Machine Learning-based Anomaly Dete...A Brief Study on Different Intrusions and Machine Learning-based Anomaly Dete...
A Brief Study on Different Intrusions and Machine Learning-based Anomaly Dete...Eswar Publications
 
Network Infrastructure Security in Cellular Data Networks: An Initial Invest...
Network Infrastructure Security in  Cellular Data Networks: An Initial Invest...Network Infrastructure Security in  Cellular Data Networks: An Initial Invest...
Network Infrastructure Security in Cellular Data Networks: An Initial Invest...Vishal Sharma, Ph.D.
 
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack DetectionIRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack DetectionIRJET Journal
 
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...IRJET Journal
 
Cdl Scada Poster V2
Cdl Scada Poster V2Cdl Scada Poster V2
Cdl Scada Poster V2keithandrew
 
A Cyber Infrastructure SCADA Testbed Environment for Research on the Nation\'...
A Cyber Infrastructure SCADA Testbed Environment for Research on the Nation\'...A Cyber Infrastructure SCADA Testbed Environment for Research on the Nation\'...
A Cyber Infrastructure SCADA Testbed Environment for Research on the Nation\'...Christopher Klaus
 
Top 10 Cited Network Security Research Articles 2021 - 2022
Top 10 Cited Network Security Research Articles 2021 - 2022Top 10 Cited Network Security Research Articles 2021 - 2022
Top 10 Cited Network Security Research Articles 2021 - 2022IJNSA Journal
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysisijceronline
 
An Analysis on Software Defined Wireless Network using Stride Model
An Analysis on Software Defined Wireless Network using Stride ModelAn Analysis on Software Defined Wireless Network using Stride Model
An Analysis on Software Defined Wireless Network using Stride ModelIRJET Journal
 
Intrusion Detection System Using Machine Learning: An Overview
Intrusion Detection System Using Machine Learning: An OverviewIntrusion Detection System Using Machine Learning: An Overview
Intrusion Detection System Using Machine Learning: An OverviewIRJET Journal
 
Security Landscape of a Strong Ecosystem to Protect Sensitive Information in ...
Security Landscape of a Strong Ecosystem to Protect Sensitive Information in ...Security Landscape of a Strong Ecosystem to Protect Sensitive Information in ...
Security Landscape of a Strong Ecosystem to Protect Sensitive Information in ...IRJET Journal
 
A SURVEY ON THE USE OF DATA CLUSTERING FOR INTRUSION DETECTION SYSTEM IN CYBE...
A SURVEY ON THE USE OF DATA CLUSTERING FOR INTRUSION DETECTION SYSTEM IN CYBE...A SURVEY ON THE USE OF DATA CLUSTERING FOR INTRUSION DETECTION SYSTEM IN CYBE...
A SURVEY ON THE USE OF DATA CLUSTERING FOR INTRUSION DETECTION SYSTEM IN CYBE...IJNSA Journal
 

Similar to An improved network intrusion detection technique based on (20)

Multipath Dynamic Source Routing Protocol using Portfolio Selection
Multipath Dynamic Source Routing Protocol using Portfolio SelectionMultipath Dynamic Source Routing Protocol using Portfolio Selection
Multipath Dynamic Source Routing Protocol using Portfolio Selection
 
IRJET- An Intrusion Detection and Protection System by using Data Mining ...
IRJET-  	  An Intrusion Detection and Protection System by using Data Mining ...IRJET-  	  An Intrusion Detection and Protection System by using Data Mining ...
IRJET- An Intrusion Detection and Protection System by using Data Mining ...
 
Peripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network SecurityPeripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network Security
 
Current issues - International Journal of Network Security & Its Applications...
Current issues - International Journal of Network Security & Its Applications...Current issues - International Journal of Network Security & Its Applications...
Current issues - International Journal of Network Security & Its Applications...
 
A Brief Study on Different Intrusions and Machine Learning-based Anomaly Dete...
A Brief Study on Different Intrusions and Machine Learning-based Anomaly Dete...A Brief Study on Different Intrusions and Machine Learning-based Anomaly Dete...
A Brief Study on Different Intrusions and Machine Learning-based Anomaly Dete...
 
Network Infrastructure Security in Cellular Data Networks: An Initial Invest...
Network Infrastructure Security in  Cellular Data Networks: An Initial Invest...Network Infrastructure Security in  Cellular Data Networks: An Initial Invest...
Network Infrastructure Security in Cellular Data Networks: An Initial Invest...
 
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack DetectionIRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
 
1850 1854
1850 18541850 1854
1850 1854
 
1850 1854
1850 18541850 1854
1850 1854
 
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
 
CDL Scada Security Poster
CDL Scada Security PosterCDL Scada Security Poster
CDL Scada Security Poster
 
Cdl Scada Poster V2
Cdl Scada Poster V2Cdl Scada Poster V2
Cdl Scada Poster V2
 
A Cyber Infrastructure SCADA Testbed Environment for Research on the Nation\'...
A Cyber Infrastructure SCADA Testbed Environment for Research on the Nation\'...A Cyber Infrastructure SCADA Testbed Environment for Research on the Nation\'...
A Cyber Infrastructure SCADA Testbed Environment for Research on the Nation\'...
 
Top 10 Cited Network Security Research Articles 2021 - 2022
Top 10 Cited Network Security Research Articles 2021 - 2022Top 10 Cited Network Security Research Articles 2021 - 2022
Top 10 Cited Network Security Research Articles 2021 - 2022
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
 
An Analysis on Software Defined Wireless Network using Stride Model
An Analysis on Software Defined Wireless Network using Stride ModelAn Analysis on Software Defined Wireless Network using Stride Model
An Analysis on Software Defined Wireless Network using Stride Model
 
Intrusion Detection System Using Machine Learning: An Overview
Intrusion Detection System Using Machine Learning: An OverviewIntrusion Detection System Using Machine Learning: An Overview
Intrusion Detection System Using Machine Learning: An Overview
 
Ak03402100217
Ak03402100217Ak03402100217
Ak03402100217
 
Security Landscape of a Strong Ecosystem to Protect Sensitive Information in ...
Security Landscape of a Strong Ecosystem to Protect Sensitive Information in ...Security Landscape of a Strong Ecosystem to Protect Sensitive Information in ...
Security Landscape of a Strong Ecosystem to Protect Sensitive Information in ...
 
A SURVEY ON THE USE OF DATA CLUSTERING FOR INTRUSION DETECTION SYSTEM IN CYBE...
A SURVEY ON THE USE OF DATA CLUSTERING FOR INTRUSION DETECTION SYSTEM IN CYBE...A SURVEY ON THE USE OF DATA CLUSTERING FOR INTRUSION DETECTION SYSTEM IN CYBE...
A SURVEY ON THE USE OF DATA CLUSTERING FOR INTRUSION DETECTION SYSTEM IN CYBE...
 

More from yousef emami

A sonic-wave system that prevents from beetle entrance to building
A sonic-wave system that prevents from beetle entrance to buildingA sonic-wave system that prevents from beetle entrance to building
A sonic-wave system that prevents from beetle entrance to buildingyousef emami
 
An Energy-efficient Data Transmission Scheme in Underwater Wireless Sensor Ne...
An Energy-efficient Data Transmission Scheme in Underwater Wireless Sensor Ne...An Energy-efficient Data Transmission Scheme in Underwater Wireless Sensor Ne...
An Energy-efficient Data Transmission Scheme in Underwater Wireless Sensor Ne...yousef emami
 
ارائه یک رویکرد کارا در حفظ انرژي بر اساس روش هاي دیتافیوژن آگاه از ترافیک بر...
ارائه یک رویکرد کارا در حفظ انرژي بر اساس روش هاي دیتافیوژن آگاه از ترافیک بر...ارائه یک رویکرد کارا در حفظ انرژي بر اساس روش هاي دیتافیوژن آگاه از ترافیک بر...
ارائه یک رویکرد کارا در حفظ انرژي بر اساس روش هاي دیتافیوژن آگاه از ترافیک بر...yousef emami
 
Automatic Management of Wireless Sensor Networks through Cloud Computing
Automatic Management of Wireless Sensor Networks through Cloud ComputingAutomatic Management of Wireless Sensor Networks through Cloud Computing
Automatic Management of Wireless Sensor Networks through Cloud Computingyousef emami
 
Remote network monitoring
Remote network monitoringRemote network monitoring
Remote network monitoringyousef emami
 

More from yousef emami (8)

A sonic-wave system that prevents from beetle entrance to building
A sonic-wave system that prevents from beetle entrance to buildingA sonic-wave system that prevents from beetle entrance to building
A sonic-wave system that prevents from beetle entrance to building
 
An Energy-efficient Data Transmission Scheme in Underwater Wireless Sensor Ne...
An Energy-efficient Data Transmission Scheme in Underwater Wireless Sensor Ne...An Energy-efficient Data Transmission Scheme in Underwater Wireless Sensor Ne...
An Energy-efficient Data Transmission Scheme in Underwater Wireless Sensor Ne...
 
ارائه یک رویکرد کارا در حفظ انرژي بر اساس روش هاي دیتافیوژن آگاه از ترافیک بر...
ارائه یک رویکرد کارا در حفظ انرژي بر اساس روش هاي دیتافیوژن آگاه از ترافیک بر...ارائه یک رویکرد کارا در حفظ انرژي بر اساس روش هاي دیتافیوژن آگاه از ترافیک بر...
ارائه یک رویکرد کارا در حفظ انرژي بر اساس روش هاي دیتافیوژن آگاه از ترافیک بر...
 
Automatic Management of Wireless Sensor Networks through Cloud Computing
Automatic Management of Wireless Sensor Networks through Cloud ComputingAutomatic Management of Wireless Sensor Networks through Cloud Computing
Automatic Management of Wireless Sensor Networks through Cloud Computing
 
VM placement
VM placementVM placement
VM placement
 
Data fusion
Data fusionData fusion
Data fusion
 
Remote network monitoring
Remote network monitoringRemote network monitoring
Remote network monitoring
 
Wi Fi Security
Wi Fi SecurityWi Fi Security
Wi Fi Security
 

Recently uploaded

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 

Recently uploaded (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 

An improved network intrusion detection technique based on

  • 1. AN IMPROVED NETWORK INTRUSION DETECTION TECHNIQUE BASED ON K-MEANS CLUSTERING VIA NAIVE BAYES CLASSIFICATION YOUSEF EMAMI Yousef.emami@ieee.org 03/30/16 Data Mining's Presentation,CE&IT Faculty,Shiraz University of Technology 1
  • 2. AGENDA Intrusion Detection Dataset Description THE PROPOSED MODEL FOR NIDS EXPERIMENT AND RESULTS 03/30/16 Data Mining's Presentation,CE&IT Faculty,Shiraz University of Technology 2
  • 3. INTRUSION DETECTION An Intrusion Detection System (IDS) inspects the activities in a system for suspicious behaviour or patterns that may indicate system attack or misuse. There are two main categories of intrusion detection techniques;  Anomaly detection Misuse detection Here ,the performance of K-means clustering and naïve classifier when trained to identify signature of specific attacks is reviewed. 03/30/16 Data Mining's Presentation,CE&IT Faculty,Shiraz University of Technology 3
  • 4. DATASET DESCRIPTION The utilized data set is KDD Cup which contained a wide variety of intrusions simulated in a military network environment It consisted of approximately 4,900,000 data instances The simulated attacks fell in one of the following four categories: DOS-Denial of Service (e.g. a syn flood), R2L- Unauthorized access from a remote machine (e.g. password guessing),  U2R-Unauthorized access to super user or root functions (e.g. a buffer overflow attack)  Probing-surveillance and other probing for vulnerabilities (e.g. port scanning). 03/30/16 Data Mining's Presentation,CE&IT Faculty,Shiraz University of Technology 4
  • 5. K-MEANS CLUSTERING VIA NAIVE BAYES CLASSIFICATION MODEL FOR NIDS 03/30/16 Data Mining's Presentation,CE&IT Faculty,Shiraz University of Technology 5
  • 6. Metrics 03/30/16 Data Mining's Presentation,CE&IT Faculty,Shiraz University of Technology 6
  • 7. 03/30/16 Data Mining's Presentation,CE&IT Faculty,Shiraz University of Technology 7
  • 8. 03/30/16 Data Mining's Presentation,CE&IT Faculty,Shiraz University of Technology 8
  • 9. 03/30/16 Data Mining's Presentation,CE&IT Faculty,Shiraz University of Technology 9
  • 10. 03/30/16 Data Mining's Presentation,CE&IT Faculty,Shiraz University of Technology 10
  • 11. Thank you for your kind attention 03/30/16 Data Mining's Presentation,CE&IT Faculty,Shiraz University of Technology 11
  • 12. REFERENCE • Sanjay Kumar Sharmai, Pankaj Pande, Susheel Kumar Tiwari and Mahendra Singh Sisodiai,”An Improved Network Intrusion Detection Technique based on k-Means Clustering via NaIve Bayes Classification”, IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012) March 30, 31, 2012 03/30/16 Data Mining's Presentation,CE&IT Faculty,Shiraz University of Technology 12