SlideShare a Scribd company logo
1 of 10
Download to read offline
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 2, April 2013
DOI : 10.5121/ijwmn.2013.5206 71
MODERNIZED INTRUSION DETECTION USING
ENHANCED APRIORI ALGORITHM
Lalli1
and Palanisamy2
1
Department of Computer Science, Bharathidasan University, Trichy
Lalli_bdu@yahoo.co.in
2
Department of Computer Science & Engineering, Alagappa University, Karaikudi
vpazhanisamy@yahoo.co.in
ABSTRACT
Communication networks are essential and it will create many crucial issues today. Nowadays, we
consider that the firewalls are the first line of defense but that policies cannot meet the particular
requirements of needed process to achieve security. Most of the research has been done in this area but
we are lagging to achieve security needs. Already many models such as ADAM, DHP, LERAD and
ENTROPHY are proposed to resolve security problems but we need an efficient model to detect new types
of various intrusions within the entire network. In this paper, we proposed to design a modernized
intrusion detection system which consist of two methods such as anomaly and misuse detection. Both are
integrated and also used to detect novel attacks. Our system proposed to discover temporal pattern of
attacker behaviors, which is profiled using an algorithm EAA (Enhanced Apriori Algorithm). This is
experimented with a simple interface to display the behaviors of attacks effectively.
KEYWORDS
Intrusion Detection System, Data Mining, Security, Intrusions, Apriori Algorithm
1. INTRODUCTION
Intrusion detection is a device that monitors activity to identify malicious or suspicious events
and also produce reports to a management station. Many new intrusions or attackers are coming
out every day to abusing the computing system privileges. An intrusion detection system is a
sensor, like smoke detector, that raises an alarm if any specific things occur. According to the
alarms, the security analyst will be detected as positive and negative ones separately. If it is a
smaller network, the intrusion detection systems perform simple pattern matching and report
situations that match a pattern corresponding to a known attack type. But the detection of new
attacks is not possible in a complex network. The quantity of traffic makes it obligatory for
network administrators and network security experts to use specific tools, called intrusion
detection systems (IDS), to prune down the monitoring activity they require to do. The IDS are
evaluated on the basis of its accuracy, efficiency and usability. The characteristics used to
evaluate the accuracy of the IDS are as follows. 1. Detection Rate: The number of attacks to be
detected by the system. 2. False Positive Rate: It is the percentage of normal data that the
system in-correctly determines to be intrusive. The accuracy of the different IDS can be
compared with the detection rate against false positive rate. The comparison should be
represented a plot named as Receiver Operating Characteristic (ROC) curve. The accuracy gives
a measure of the ability of the IDS to handle noisy, discrete data and to adapt.
In general, detection mechanism used by IDS can be classified into two major categories.
1)Signature based detection: Models built from well known attack types, that is already known
attack patterns. 2)Anomaly based detection: Modeled using normal traffic and deviation from
this profile is considered anomalous. 3) Hybrid of both anomaly and misuse detection: Many
systems are used anomaly detection and misuse detection to detect various types of intrusions
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 2, April 2013
72
effectively. To build powerful IDS, it is necessary to enumerate the desirable characteristics
such as fault tolerance, imperviousness to subversion, scalability, adaptability, minimal
overhead, configurability, graceful degradation of service.
The rest of the paper is organized as follows. In section 2, we briefly describe about Data
Mining and their related work for IDS. We put forth a detailed description of our algorithm in
section 3. We discuss about the experimental results in section 4. In section 5, we summarize
the paper.
2. DATA MINING TECHNOLOGY
Data Mining is knowledge discovery in databases. Data Mining is knowledge discovery in
databases. Data mining techniques are used to find out the hidden patterns automatically in an
entire database. Data warehouse is an integration of multiple databases, data cubes and files. We
have mined all the data, to predict it according to their relationship. Data mining is the search
for the relationships and global patterns that exist in large databases but are hidden among vast
amounts of data. It is also denoted as automated statistical analysis. The most commonly used
techniques in data mining are: Neural networks, Genetic algorithms, Association rule mining,
Clustering and Classification. The association rule mining technique is applied for our proposed
work.
2.1. Related Work
Ye Changguo [1] has described about Network Intrusion Detection System (IDS), as the main
security defending technique, are second guard for a network after firewall. Ye Changguo [1]
has described about Network Intrusion Detection System (IDS), as the main security defending
technique, are second guard for a network after firewall. The author described that the huge
database log can be mined with the help of fuzzy rule mining algorithm. It gives the better
results compared to Apriori algorithm.
Aly Ei-Senary et al[2] has integrated Apriori and Kuok’s algorithms to capture the features of
network traffic using fuzzy logic rules. Amir Azimi alasti et al[3]says that the reduction of false
positive alerts and correlation between alerts are done by formalized SOM. The accuracy can be
improved by Alert Filtering and Cluster Merging algorithms. Anderson J. P.[4] using data
mining techniques and signature based tools for MINDS. The model can be developed by
Denning D.E et al[5] to monitor the abnormal activities. Dewan M et al[6] has used ISABA for
alert classification and also to reduce the number of false positives. Each and every user
behavior can be identified by Neural network by Jake Ryan et al[7].
Jin-Ling Zhao[8] proposed to achieve the high detection rate and low false alarm rate through
clustering and genetic optimizing stages. Norouzian M.R et al[9] described the neural network
concepts to detect various attacks and also to classify six groups of two hidden layers in Multi-
Layer Perceptron (MLP). All the system calls to be traced out by Host based Intrusion Detection
System. OSwais. S et al[10] proposed the membership function can be tuned by genetic
algorithm, it is performed by using approach based IDS and also implemented by Gas. Alan
Bivens et al[11] has proposed the NIDS model to classify self organizing maps for data
clustering. The MLP neural network is one of the best ways to creating uniform, grouping of
inputs and they are detected effectively when a dynamic number of inputs are presented. S.
Sathyabama et al[12] has described about clustering techniques and outliers for grouping the
user’s behaviors and also detecting different behaviors easily.
Teng.H.S [13] applied sequential rules to capture a user’s behavior over time. According to the
User activity patterns, the specific rules are used to find out the specific activities. High quality
sequential patterns are automatically generated using inductive generalization and lower quality
patterns are eliminated. An automated strategy for generation of fuzzy rules obtained from
definite rules using frequent items. Taeshik Shon et al [14] proposed an enhanced SVM
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 2, April 2013
73
approach framework for detecting and classifying the novel attacks in network traffic such as
packet profiling using SOFM, packet filtering using PTF, field selection using Genetic
Algorithm and packet flow-based data pre-processing. SOFM clustering was used for normal
profiling. The SVM approach provides false positive rate similar to that of real NIDSs.
Stephen F. Ownes, R. R. Levary[15] has stated that the expert system techniques are used for
intrusion detection systems. The fuzzy sets are used to find out various types of attacks.
Depends up on the types of threat it is easy to implement the expert system technology.
In that specific problem, we wish to tackle through our IDS is, to generate a modernized
intrusion detection which will effectively detects both anomaly and misuse detections using
EAA (Enhanced Apriori Algorithm) and also will reduce false positives effectively.
3. ARCHITECTURE FRAMEWORK AND PROPOSED ENHANCED APRIORI
ALGORITHM
It is necessary to detect the potential attacks for anomalous behavior from the existing patterns
because we predict the future actions of the attacker’s. Sequential pattern mining techniques are
used to analyze various IDS alerts. In this paper, we propose a model modernized intrusion
detection system consist of two methods, anomaly detection and misuse detection to detect
intrusions. We have integrated both anomaly and misuse detection due to its ability to detect
novel attacks. Our system is used to find out the behaviors of various attacks using EAA.
In this paper we proposed to design and develop an intelligent data mining intrusion detection
system and its core part a composite detection engine with anomaly detection and misuse
detection features and the two detection engines work serially to detect the user's activity in
turn.
Figure 1. Design Architecture
The real time data’s are collected from the database audit system. We have analyze the audit
data and to find out its normal and abnormal behaviors. As a result, identify the abnormal
activity through statistical analysis.
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 2, April 2013
74
The design of architecture framework is mainly composed of the following parts: data collecting
and pre-processing module, association rule mining module and intrusion detection analysis
module, etc as shown in Figure 1.
3.1 The Proposed Algorithm - EAA
In this section, we proposed the Enhanced Apriori Algorithm(EAA). It is an extension of basic
Apriori Algorithm. Several rule sets are framed as follows.
Rule 1 : If both anomaly and misuse module detected an attack then the specific attack can be
classified by misuse module.
Rule 2 : If misuse module can detect an attack then the specific attack can be classified by
misuse module.
Rule 3 : If anomaly module can detect an attack then the specific attack can be declared as
unclassified attack.
L1= {frequent candidates};
for (k= 2; Lk-1 !=∅; k++) do begin
Ck= candidates are generated from Lk-1 (cartesian product Lk-1 x Lk-1 and
eliminating any k-1 size itemset is not a frequent one);
While LK-1≠ф
Ck <- Generate(LK-1)
For transactions t € T
Ct, <- Subset(Ckt)
For candidates c € Ct
count[c] <- count[c] + 1
LK <- { c € Ck | count [c] >= € }
K <- K+1
Return µ Lk
for each transaction t in database do
increment the count of all candidates in
Ck that are contained in t
Lk = candidates in Ck with min_sup
end
Return µ Lk;
Let’s define:
Ck candidate itemset of size k
Lk frequent itemset of size k
Main steps of iteration are:
Find frequent set Lk-1
Join step: Ck is generated by joining Lk-1 with itself
( cartesian product Lk-1 x Lk-1 )
Prune step (apriori property):
Any (k − 1) size itemset is not a frequent subset
of k size itemset, then it should be removed
Frequent set Lk has been achieved
Figure 2. EAA Algorithm
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 2, April 2013
75
Association Mining aims to extract interesting correlation, frequent patterns, and associations
among sets of items or objects in transaction databases. Association rules satisfy both a
minimum support threshold (min_sup) and minimum confidence threshold (min_conf). Audit
data can be obtained from various databases, it consist of number of rows (audit record) and
columns (system features). Association rules are used to capture the consistent behaviors and
then it is implemented through aggregate rule sets. Our proposed algorithm is in pseudo code
format.
4. EXPERIMENTAL RESULTS
The proposed EAA is experimented to find out the efficiency of detecting false positives and
false negatives that are occurred in IDS. The new type of attacks can be detected effectively by
EAA and then automatically knowledge base can be updated. The experimental result shows,
that it was better to find normal packet performance, faster in terms of execution time and also
detecting the effectiveness and accuracy of false positives and false negatives.
The input parameters are data size (The size of the each audit record in database) and Data
Length (Processing time of each audit record measured in seconds). Our proposed technique
EAA approach gives better performance in evaluating large size audit data when compared to
the existing techniques.
False Positive Rate = Number of false positives / Total number of abnormal labels.
False Negative Rate = Number of false negatives / Total number of normal labels.
Figure 3. Nodes without intrusion
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 2, April 2013
76
Figure 4. Nodes with intrusion
Table 1. Evaluation between existing and
proposed Approach
Data
Size
Data Length
(Existing)
Data Length
(Proposed)
1876 34 10
876 56 13
4526 87 20
5435 35 27
987 65 11
1234 27 16
675 74 08
2345 55 22
5432 33 25
5261 23 23
2176 22 19
165 11 02
765 65 09
763 23 09
343 25 10
7845 64 33
This paper improves the detecting speed and accuracy as a goal, and proposed a more efficient
EAA (Enhanced Apriori Algorithm) to abnormal detecting experiment to be based on network.
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 2, April 2013
77
In this approach we shows that new type of attack can be detected effectively in the system and
the knowledge base can be updated automatically.
Finally the experimental results are compared and analyzed. Our proposed algorithm is
effectively identify malicious attacks and also increase the efficiency. This section will shows
the result based on the inputs as, Data Size: The size of the each audit record in database and
Data Length: Processing time of each audit record measured in seconds. From the Figure 5. We
can conclude that our proposed technique called EAA approach gives better performance in
evaluating large size of audit data when compared to the existing techniques.
Figure 5. Performance Analysis
The IDS are evaluated on the basis of its accuracy, efficiency and usability. The characteristics
used to evaluate the accuracy of the IDS are, Detection Rate: It is the percentage of attacks that
a system detects and False Positive Rate: It is the percentage of normal data that the system in-
correctly determines to be intrusive.
Figure 6. Compression chart for false positives and false negatives
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 2, April 2013
78
Different types of IDS can be analyzed according to the detection rate and it is plotted as a
Receiver Operating Characteristic (ROC) curve. The accuracy gives a measure of the ability of
the IDS to handle noisy, discrete data and to adapt. The compression range of false positives
and false negatives are shown in Figure 6.
The experimental results shows that the security range between existing and proposed technique
based on the ratio (59:67) is in Figure 7.
Figure 7. Performance Analysis for Existing and
Proposed system
An existing research, it is based on simple and basic association algorithm to enhance the
efficiency of association rule mining, which is not sufficient one to generate frequent item set.
Another problem is in fuzzy set theory, it is often requires several analysis before the number of
frequent item set produce. It can be very sensitive to the choice of initial analysis and it does not
yield the same result with each run, since the resulting frequent item set depends on the initial
random assignments. So it is not sufficient for runtime intrusion detection efficiency.
Reasons for Supremacy over other algorithms:-
• Proposed Design will be better than existing to find normal packet performance.
• Proposed Design will be faster than existing in terms of execution time.
• Proposed Design will be smaller than existing and easy to understand and implement.
• It will do not contain complex structure, control flow will be well defined and looping
structure will be minimized. Due to the above facts it will take very less time for execution.
It is a modern Intrusion Detection with Intelligent Analysis that meets the challenges that
traditional intrusion detection systems failed to meet:
• need for accuracy
• need for active responses
• need for speed and reliability
• need for usability
5. CONCLUSION & FUTURE WORK
Using advantages of characteristic extraction of data mining theory in dealing with large
amounts of data, the new model MIDS which combines both misuse detecting and anomaly
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 2, April 2013
79
detection is proposed in this paper. In this model we applying Enhanced Apriori (EAA)
algorithm to the training data set that containing a large number of intrusions to establish and
update the ‘normal’ and ‘abnormal’ behavior rules. It is, therefore, concluded that the given
methods can be easily adapted to the configuration of MIDS to reduce the manual efforts used
to configure them, reduce alert generation and hence improve their effectiveness. And the
results of simulation manifested that the new model has a trait of high detection rate and low
false positive rate. Besides, unknown intrusion can be detected at the same time effectively.
In Future Enhancement, we investigate the methods and benefits of combining multiple simple
detection models. In Future Enhancement, we investigate the methods and benefits of
combining multiple simple detection models. We enhance this model by using multiple audit
data sets from multiple data streams to improve the accuracy and efficiency.
REFERENCES
[1] Ye Changguo , “The Research on the Application of Association Rules Mining Algorithm in
Network Intrusion Detection” Transactions on Software Engineering, IEEE Communication
Magazine.
[2] Aly Ei-Semary, Janica Edmonds, Jesus Gonzalez-Pino, Mauricio Papa, “Applying Data Mining
of Fuzzy Association Rules to Network Intrusion Detection”, in the Proceedings of Workshop on
Information Assurance United States Military Academy 2006, IEEE Communication Magazine,
West Point, Y,DOI:10.1109/IAW.2006/652083.
[3] Amir Azimi, Alasti, Ahrabi, Ahmad Habibizad Navin, Hadi Bahrbegi, “A New System for
Clustering & Classification of Intrusion Detection System Alerts Using SOM”, International
Journal of Computer Science & Security, Vol: 4, Issue: 6, pp-589-597, 2011.
[4] Anderson.J.P, “Computer Security Threat Monitoring & Surveilance”, Technical Report, James
P Anderson co., Fort Washington, Pennsylvania, 1980.
[5] Denning .D.E, ”An Intrusion Detection Model”, Transactions on Software Engineering, IEEE
Communication Magazine, 1987,SE-13, PP-222-232,DOI:10.1109/TSE.1987.232894.
[6] Dewan Md, Farid, Mohammed Zahidur Rahman, “Anomaly Network Intrusion Detection Based
on Improved Self Adaptive Bayesian Algorithm”, Journal of Computers, Vol 5, pp-23-31, Jan
2010, DOI:10.4.304/jcp 5.1.
[7] Jake Ryan, Meng - Jang Lin, Risto Miikkulainen, ”Intrusion Detection With Neural Networks”,
Advances in Neural Information Processing System 10, Cambridge, MA:MIT
Press,1998,DOI:10.1.1.31.3570.
[8] Jin-Ling Zhao, Jiu-fen Zhao ,Jian-Jun Li, “Intrusion Detection Based on Clustering Genetic
Algorithm”, in Proceedings of International Conference on Machine Learning & Cybernetics
(ICML),2005,IEEECommunicationMagazine,ISBN:0-7803-9091-
DOI:10.1109/ICML.2005.1527621.
[9] Norouzian.M.R, Merati.S, “Classifying Attacks in a Network Intrusion Detection System Based
on Artificial Neural Networks”, in the Proceedings of 13th International Conference on
Advanced Communication Technology(ICACT), 2011,ISBN:978-1-4244-8830-8,pp-868-873.
[10] Oswais.S, Snasel.V, Kromer.P, Abraham. A, “Survey: Using Genetic Algorithm Approach in
Intrusion Detection Systems Techniques”, in the Proceedings of 7th International Conference on
Computer Information & Industrial Management Applications (CISIM), 2008, International
Journal of Computer Applications (0975 – 8887) Volume 35– No.8, December 2011 56 IEEE
Communication Magazine,pp-300-307,ISBN:978-0-7695-318-7,DOI:10.1109/CISM.2008-49.
[11] Alan Bivens, Chandrika Palagiri, Rasheda Smith, Boleslaw Szymanski, ”Network-Based
Intrusion Detection Using Neural Networks”, in Proceedings of the Intelligent Engineering
Systems Through Artificial Neural Networks, St.Louis, ANNIE-2002, and Vol: 12, pp- 579-584,
ASME Press, New York.
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 2, April 2013
80
[12] Sathyabama.S, Irfan Ahmed.M.S, Saravanan.A,”Network Intrusion Detection Using Clustering:
A Data Mining Approach”, International Journal of Computer Application (0975-8887), Sep-
2011, Vol: 30, No: 4, ISBN: 978-93-80864-87-5, DOI: 10.5120/3670-5071.
[13] Teng.H.S, Chen.K and Lu.S.C, “Adaptive Real-Time Anomaly Detection using Inductively
Generated Sequential Patterns, in the Proceedings of Symposium on research in Computer
Security & Privacy, IEEE Communication Magazine,1990, pp-278-284.
[14] Taeshik Shon, Jong Sub Moon, “A Hybrid Machine Learning Approach to Network Anomaly
Detection”, Information Sciences 2007, Vol: 177, Issue: 18, Publisher: USENIX Association,
pp- 3799-3821, ISSN:00200255,DOI:10.1016/j.ins-2007.03.025.
[15] Stephen F. Owens, Reuven R. Levary, "An adaptive expert system approach for intrusion
detection", International Journal of Security and Networks, Vol: 1, No: 3/4, pp: 206-217, 2006.
[16] Tcptrace software tool, www.tcptrace.org.
[17] SNORT Intrusion Detection System. www.snort.org.
[18] Sans Institute. The SANS Security Policy Project.
http://www.sans.org/newlook/resources/policies/policies.htm
Authors
Author 1 : Lalli. M is working as a Assistant Professor in the Department of
Computer Science & Engg., Bharathidasan University, Trichy, Tamil
Nadu, India. She has 10 Years of experience in teaching. Her area of
interest is Manets. Other areas of on interest include Information Security
and Computer Networks and she is pursuing Ph.D in mobile Ad-hoc
network security under the guidance of Dr. V. Palanisamy.
Author 2. Palanisamy.V is working as a Head of the Department of Computer
Science & Engg Alagappa university. Karaikudi, Tamil Nadu, India. He
has 20 Years of Teaching and 15 Years of experience in research. His
area of Specialization is Wireless networks and network security. Other
areas of an interest is include Algorithms.

More Related Content

What's hot

Secure masid secure multi agent system for intrusion detection-2
Secure masid secure multi agent system for intrusion detection-2Secure masid secure multi agent system for intrusion detection-2
Secure masid secure multi agent system for intrusion detection-2IAEME Publication
 
The Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational DatabasesThe Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational DatabasesIJRES Journal
 
A Survey of Various Intrusion Detection Systems
A Survey of Various Intrusion Detection SystemsA Survey of Various Intrusion Detection Systems
A Survey of Various Intrusion Detection Systemsijsrd.com
 
11.a genetic algorithm based elucidation for improving intrusion detection th...
11.a genetic algorithm based elucidation for improving intrusion detection th...11.a genetic algorithm based elucidation for improving intrusion detection th...
11.a genetic algorithm based elucidation for improving intrusion detection th...Alexander Decker
 
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...Alexander Decker
 
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...IJNSA Journal
 
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...IJCSIS Research Publications
 
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET -  	  A Secure Approach for Intruder Detection using BacktrackingIRJET -  	  A Secure Approach for Intruder Detection using Backtracking
IRJET - A Secure Approach for Intruder Detection using BacktrackingIRJET Journal
 
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...ijaia
 
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...gerogepatton
 
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMSAN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMSieijjournal
 
Intrusion detection system via fuzzy
Intrusion detection system via fuzzyIntrusion detection system via fuzzy
Intrusion detection system via fuzzyIJDKP
 
IRJET- Improving Cyber Security using Artificial Intelligence
IRJET- Improving Cyber Security using Artificial IntelligenceIRJET- Improving Cyber Security using Artificial Intelligence
IRJET- Improving Cyber Security using Artificial IntelligenceIRJET Journal
 
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...IRJET Journal
 

What's hot (15)

Secure masid secure multi agent system for intrusion detection-2
Secure masid secure multi agent system for intrusion detection-2Secure masid secure multi agent system for intrusion detection-2
Secure masid secure multi agent system for intrusion detection-2
 
The Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational DatabasesThe Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational Databases
 
A Survey of Various Intrusion Detection Systems
A Survey of Various Intrusion Detection SystemsA Survey of Various Intrusion Detection Systems
A Survey of Various Intrusion Detection Systems
 
A45010107
A45010107A45010107
A45010107
 
11.a genetic algorithm based elucidation for improving intrusion detection th...
11.a genetic algorithm based elucidation for improving intrusion detection th...11.a genetic algorithm based elucidation for improving intrusion detection th...
11.a genetic algorithm based elucidation for improving intrusion detection th...
 
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
 
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
 
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
 
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET -  	  A Secure Approach for Intruder Detection using BacktrackingIRJET -  	  A Secure Approach for Intruder Detection using Backtracking
IRJET - A Secure Approach for Intruder Detection using Backtracking
 
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
 
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
 
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMSAN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
 
Intrusion detection system via fuzzy
Intrusion detection system via fuzzyIntrusion detection system via fuzzy
Intrusion detection system via fuzzy
 
IRJET- Improving Cyber Security using Artificial Intelligence
IRJET- Improving Cyber Security using Artificial IntelligenceIRJET- Improving Cyber Security using Artificial Intelligence
IRJET- Improving Cyber Security using Artificial Intelligence
 
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
 

Viewers also liked

ENERGY CONSUMPTION IN WIRELESS SENSOR NETWORKS USING DATA FUSION ASSURANCE
ENERGY CONSUMPTION IN WIRELESS SENSOR  NETWORKS USING DATA FUSION ASSURANCEENERGY CONSUMPTION IN WIRELESS SENSOR  NETWORKS USING DATA FUSION ASSURANCE
ENERGY CONSUMPTION IN WIRELESS SENSOR NETWORKS USING DATA FUSION ASSURANCEijwmn
 
Geographic routing protocols for underwater wireless sensor networks a survey
Geographic routing protocols for underwater wireless sensor networks a surveyGeographic routing protocols for underwater wireless sensor networks a survey
Geographic routing protocols for underwater wireless sensor networks a surveyijwmn
 
Amplitude and phase modulation for ultrasonic wireless communication
Amplitude and phase modulation for ultrasonic wireless communicationAmplitude and phase modulation for ultrasonic wireless communication
Amplitude and phase modulation for ultrasonic wireless communicationijwmn
 
Effect of node mobility onaomdv protocol in manet
Effect of node mobility onaomdv protocol in manetEffect of node mobility onaomdv protocol in manet
Effect of node mobility onaomdv protocol in manetijwmn
 
Design and analysis of mimo system for uwb communication
Design and analysis of mimo system for uwb communicationDesign and analysis of mimo system for uwb communication
Design and analysis of mimo system for uwb communicationijwmn
 
A comparative study on different trust based routing schemes in manet
A comparative study on different trust based routing schemes in manetA comparative study on different trust based routing schemes in manet
A comparative study on different trust based routing schemes in manetijwmn
 
Analyses and performance of techniques papr reduction for stbc mimo ofdm syst...
Analyses and performance of techniques papr reduction for stbc mimo ofdm syst...Analyses and performance of techniques papr reduction for stbc mimo ofdm syst...
Analyses and performance of techniques papr reduction for stbc mimo ofdm syst...ijwmn
 
Pedestrain Monitoring System using Wi-Fi Technology And RSSI Based Localization
Pedestrain Monitoring System using Wi-Fi Technology And RSSI Based LocalizationPedestrain Monitoring System using Wi-Fi Technology And RSSI Based Localization
Pedestrain Monitoring System using Wi-Fi Technology And RSSI Based Localizationijwmn
 
Implementation of application for huge data file transfer
Implementation of application for huge data file transferImplementation of application for huge data file transfer
Implementation of application for huge data file transferijwmn
 
Multiagent based multipath routing in wireless sensor networks
Multiagent based multipath routing in wireless sensor networksMultiagent based multipath routing in wireless sensor networks
Multiagent based multipath routing in wireless sensor networksijwmn
 
A simulation based performance evaluation
A simulation based performance evaluationA simulation based performance evaluation
A simulation based performance evaluationijwmn
 
Enforcing end to-end proportional fairness with bounded buffer overflow proba...
Enforcing end to-end proportional fairness with bounded buffer overflow proba...Enforcing end to-end proportional fairness with bounded buffer overflow proba...
Enforcing end to-end proportional fairness with bounded buffer overflow proba...ijwmn
 
USER CENTRIC NETWORK SELECTION IN WIRELESS HETNETS
USER CENTRIC NETWORK SELECTION IN WIRELESS HETNETSUSER CENTRIC NETWORK SELECTION IN WIRELESS HETNETS
USER CENTRIC NETWORK SELECTION IN WIRELESS HETNETSijwmn
 
Design of Star-Shaped Microstrip Patch Antenna for Ultra Wideband (UWB) Appli...
Design of Star-Shaped Microstrip Patch Antenna for Ultra Wideband (UWB) Appli...Design of Star-Shaped Microstrip Patch Antenna for Ultra Wideband (UWB) Appli...
Design of Star-Shaped Microstrip Patch Antenna for Ultra Wideband (UWB) Appli...ijwmn
 
An energy saving algorithm to prolong
An energy saving algorithm to prolongAn energy saving algorithm to prolong
An energy saving algorithm to prolongijwmn
 
AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...
AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...
AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...ijwmn
 
Performance Simulation and Analysis for LTESystem Using Human Behavior Queue ...
Performance Simulation and Analysis for LTESystem Using Human Behavior Queue ...Performance Simulation and Analysis for LTESystem Using Human Behavior Queue ...
Performance Simulation and Analysis for LTESystem Using Human Behavior Queue ...ijwmn
 
A NOVEL METHODOLOGY TO OVERCOME ROUTING MISBEHAVIOR IN MANET USING RETALIATIO...
A NOVEL METHODOLOGY TO OVERCOME ROUTING MISBEHAVIOR IN MANET USING RETALIATIO...A NOVEL METHODOLOGY TO OVERCOME ROUTING MISBEHAVIOR IN MANET USING RETALIATIO...
A NOVEL METHODOLOGY TO OVERCOME ROUTING MISBEHAVIOR IN MANET USING RETALIATIO...ijwmn
 

Viewers also liked (18)

ENERGY CONSUMPTION IN WIRELESS SENSOR NETWORKS USING DATA FUSION ASSURANCE
ENERGY CONSUMPTION IN WIRELESS SENSOR  NETWORKS USING DATA FUSION ASSURANCEENERGY CONSUMPTION IN WIRELESS SENSOR  NETWORKS USING DATA FUSION ASSURANCE
ENERGY CONSUMPTION IN WIRELESS SENSOR NETWORKS USING DATA FUSION ASSURANCE
 
Geographic routing protocols for underwater wireless sensor networks a survey
Geographic routing protocols for underwater wireless sensor networks a surveyGeographic routing protocols for underwater wireless sensor networks a survey
Geographic routing protocols for underwater wireless sensor networks a survey
 
Amplitude and phase modulation for ultrasonic wireless communication
Amplitude and phase modulation for ultrasonic wireless communicationAmplitude and phase modulation for ultrasonic wireless communication
Amplitude and phase modulation for ultrasonic wireless communication
 
Effect of node mobility onaomdv protocol in manet
Effect of node mobility onaomdv protocol in manetEffect of node mobility onaomdv protocol in manet
Effect of node mobility onaomdv protocol in manet
 
Design and analysis of mimo system for uwb communication
Design and analysis of mimo system for uwb communicationDesign and analysis of mimo system for uwb communication
Design and analysis of mimo system for uwb communication
 
A comparative study on different trust based routing schemes in manet
A comparative study on different trust based routing schemes in manetA comparative study on different trust based routing schemes in manet
A comparative study on different trust based routing schemes in manet
 
Analyses and performance of techniques papr reduction for stbc mimo ofdm syst...
Analyses and performance of techniques papr reduction for stbc mimo ofdm syst...Analyses and performance of techniques papr reduction for stbc mimo ofdm syst...
Analyses and performance of techniques papr reduction for stbc mimo ofdm syst...
 
Pedestrain Monitoring System using Wi-Fi Technology And RSSI Based Localization
Pedestrain Monitoring System using Wi-Fi Technology And RSSI Based LocalizationPedestrain Monitoring System using Wi-Fi Technology And RSSI Based Localization
Pedestrain Monitoring System using Wi-Fi Technology And RSSI Based Localization
 
Implementation of application for huge data file transfer
Implementation of application for huge data file transferImplementation of application for huge data file transfer
Implementation of application for huge data file transfer
 
Multiagent based multipath routing in wireless sensor networks
Multiagent based multipath routing in wireless sensor networksMultiagent based multipath routing in wireless sensor networks
Multiagent based multipath routing in wireless sensor networks
 
A simulation based performance evaluation
A simulation based performance evaluationA simulation based performance evaluation
A simulation based performance evaluation
 
Enforcing end to-end proportional fairness with bounded buffer overflow proba...
Enforcing end to-end proportional fairness with bounded buffer overflow proba...Enforcing end to-end proportional fairness with bounded buffer overflow proba...
Enforcing end to-end proportional fairness with bounded buffer overflow proba...
 
USER CENTRIC NETWORK SELECTION IN WIRELESS HETNETS
USER CENTRIC NETWORK SELECTION IN WIRELESS HETNETSUSER CENTRIC NETWORK SELECTION IN WIRELESS HETNETS
USER CENTRIC NETWORK SELECTION IN WIRELESS HETNETS
 
Design of Star-Shaped Microstrip Patch Antenna for Ultra Wideband (UWB) Appli...
Design of Star-Shaped Microstrip Patch Antenna for Ultra Wideband (UWB) Appli...Design of Star-Shaped Microstrip Patch Antenna for Ultra Wideband (UWB) Appli...
Design of Star-Shaped Microstrip Patch Antenna for Ultra Wideband (UWB) Appli...
 
An energy saving algorithm to prolong
An energy saving algorithm to prolongAn energy saving algorithm to prolong
An energy saving algorithm to prolong
 
AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...
AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...
AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...
 
Performance Simulation and Analysis for LTESystem Using Human Behavior Queue ...
Performance Simulation and Analysis for LTESystem Using Human Behavior Queue ...Performance Simulation and Analysis for LTESystem Using Human Behavior Queue ...
Performance Simulation and Analysis for LTESystem Using Human Behavior Queue ...
 
A NOVEL METHODOLOGY TO OVERCOME ROUTING MISBEHAVIOR IN MANET USING RETALIATIO...
A NOVEL METHODOLOGY TO OVERCOME ROUTING MISBEHAVIOR IN MANET USING RETALIATIO...A NOVEL METHODOLOGY TO OVERCOME ROUTING MISBEHAVIOR IN MANET USING RETALIATIO...
A NOVEL METHODOLOGY TO OVERCOME ROUTING MISBEHAVIOR IN MANET USING RETALIATIO...
 

Similar to Wmn06MODERNIZED INTRUSION DETECTION USING ENHANCED APRIORI ALGORITHM

Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
ATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIER
ATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIERATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIER
ATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIERCSEIJJournal
 
Attack Detection Availing Feature Discretion using Random Forest Classifier
Attack Detection Availing Feature Discretion using Random Forest ClassifierAttack Detection Availing Feature Discretion using Random Forest Classifier
Attack Detection Availing Feature Discretion using Random Forest ClassifierCSEIJJournal
 
A Survey on Different Machine Learning Algorithms and Weak Classifiers Based ...
A Survey on Different Machine Learning Algorithms and Weak Classifiers Based ...A Survey on Different Machine Learning Algorithms and Weak Classifiers Based ...
A Survey on Different Machine Learning Algorithms and Weak Classifiers Based ...gerogepatton
 
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...IJNSA Journal
 
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...IJNSA Journal
 
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNNA NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNNIJCNCJournal
 
Articles - International Journal of Network Security & Its Applications (IJNSA)
Articles - International Journal of Network Security & Its Applications (IJNSA)Articles - International Journal of Network Security & Its Applications (IJNSA)
Articles - International Journal of Network Security & Its Applications (IJNSA)IJNSA Journal
 
DB-OLS: An Approach for IDS1
DB-OLS: An Approach for IDS1DB-OLS: An Approach for IDS1
DB-OLS: An Approach for IDS1IJITE
 
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMSAN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMSieijjournal1
 
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEYSECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEYJournal For Research
 
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...IJNSA Journal
 
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...IJNSA Journal
 
Detecting Anomaly IDS in Network using Bayesian Network
Detecting Anomaly IDS in Network using Bayesian NetworkDetecting Anomaly IDS in Network using Bayesian Network
Detecting Anomaly IDS in Network using Bayesian NetworkIOSR Journals
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...ijcseit
 
SURVEY OF NETWORK ANOMALY DETECTION USING MARKOV CHAIN
SURVEY OF NETWORK ANOMALY DETECTION USING MARKOV CHAINSURVEY OF NETWORK ANOMALY DETECTION USING MARKOV CHAIN
SURVEY OF NETWORK ANOMALY DETECTION USING MARKOV CHAINijcseit
 
Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques IJMER
 
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...ijcsit
 
IDS IN TELECOMMUNICATION NETWORK USING PCA
IDS IN TELECOMMUNICATION NETWORK USING PCAIDS IN TELECOMMUNICATION NETWORK USING PCA
IDS IN TELECOMMUNICATION NETWORK USING PCAIJCNCJournal
 

Similar to Wmn06MODERNIZED INTRUSION DETECTION USING ENHANCED APRIORI ALGORITHM (20)

Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
ATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIER
ATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIERATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIER
ATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIER
 
Attack Detection Availing Feature Discretion using Random Forest Classifier
Attack Detection Availing Feature Discretion using Random Forest ClassifierAttack Detection Availing Feature Discretion using Random Forest Classifier
Attack Detection Availing Feature Discretion using Random Forest Classifier
 
A Survey on Different Machine Learning Algorithms and Weak Classifiers Based ...
A Survey on Different Machine Learning Algorithms and Weak Classifiers Based ...A Survey on Different Machine Learning Algorithms and Weak Classifiers Based ...
A Survey on Different Machine Learning Algorithms and Weak Classifiers Based ...
 
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
 
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
 
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNNA NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
 
Articles - International Journal of Network Security & Its Applications (IJNSA)
Articles - International Journal of Network Security & Its Applications (IJNSA)Articles - International Journal of Network Security & Its Applications (IJNSA)
Articles - International Journal of Network Security & Its Applications (IJNSA)
 
DB-OLS: An Approach for IDS1
DB-OLS: An Approach for IDS1DB-OLS: An Approach for IDS1
DB-OLS: An Approach for IDS1
 
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMSAN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
 
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEYSECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
 
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
 
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
 
Detecting Anomaly IDS in Network using Bayesian Network
Detecting Anomaly IDS in Network using Bayesian NetworkDetecting Anomaly IDS in Network using Bayesian Network
Detecting Anomaly IDS in Network using Bayesian Network
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
 
SURVEY OF NETWORK ANOMALY DETECTION USING MARKOV CHAIN
SURVEY OF NETWORK ANOMALY DETECTION USING MARKOV CHAINSURVEY OF NETWORK ANOMALY DETECTION USING MARKOV CHAIN
SURVEY OF NETWORK ANOMALY DETECTION USING MARKOV CHAIN
 
M0446772
M0446772M0446772
M0446772
 
Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques
 
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
 
IDS IN TELECOMMUNICATION NETWORK USING PCA
IDS IN TELECOMMUNICATION NETWORK USING PCAIDS IN TELECOMMUNICATION NETWORK USING PCA
IDS IN TELECOMMUNICATION NETWORK USING PCA
 

Recently uploaded

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 

Recently uploaded (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 

Wmn06MODERNIZED INTRUSION DETECTION USING ENHANCED APRIORI ALGORITHM

  • 1. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 2, April 2013 DOI : 10.5121/ijwmn.2013.5206 71 MODERNIZED INTRUSION DETECTION USING ENHANCED APRIORI ALGORITHM Lalli1 and Palanisamy2 1 Department of Computer Science, Bharathidasan University, Trichy Lalli_bdu@yahoo.co.in 2 Department of Computer Science & Engineering, Alagappa University, Karaikudi vpazhanisamy@yahoo.co.in ABSTRACT Communication networks are essential and it will create many crucial issues today. Nowadays, we consider that the firewalls are the first line of defense but that policies cannot meet the particular requirements of needed process to achieve security. Most of the research has been done in this area but we are lagging to achieve security needs. Already many models such as ADAM, DHP, LERAD and ENTROPHY are proposed to resolve security problems but we need an efficient model to detect new types of various intrusions within the entire network. In this paper, we proposed to design a modernized intrusion detection system which consist of two methods such as anomaly and misuse detection. Both are integrated and also used to detect novel attacks. Our system proposed to discover temporal pattern of attacker behaviors, which is profiled using an algorithm EAA (Enhanced Apriori Algorithm). This is experimented with a simple interface to display the behaviors of attacks effectively. KEYWORDS Intrusion Detection System, Data Mining, Security, Intrusions, Apriori Algorithm 1. INTRODUCTION Intrusion detection is a device that monitors activity to identify malicious or suspicious events and also produce reports to a management station. Many new intrusions or attackers are coming out every day to abusing the computing system privileges. An intrusion detection system is a sensor, like smoke detector, that raises an alarm if any specific things occur. According to the alarms, the security analyst will be detected as positive and negative ones separately. If it is a smaller network, the intrusion detection systems perform simple pattern matching and report situations that match a pattern corresponding to a known attack type. But the detection of new attacks is not possible in a complex network. The quantity of traffic makes it obligatory for network administrators and network security experts to use specific tools, called intrusion detection systems (IDS), to prune down the monitoring activity they require to do. The IDS are evaluated on the basis of its accuracy, efficiency and usability. The characteristics used to evaluate the accuracy of the IDS are as follows. 1. Detection Rate: The number of attacks to be detected by the system. 2. False Positive Rate: It is the percentage of normal data that the system in-correctly determines to be intrusive. The accuracy of the different IDS can be compared with the detection rate against false positive rate. The comparison should be represented a plot named as Receiver Operating Characteristic (ROC) curve. The accuracy gives a measure of the ability of the IDS to handle noisy, discrete data and to adapt. In general, detection mechanism used by IDS can be classified into two major categories. 1)Signature based detection: Models built from well known attack types, that is already known attack patterns. 2)Anomaly based detection: Modeled using normal traffic and deviation from this profile is considered anomalous. 3) Hybrid of both anomaly and misuse detection: Many systems are used anomaly detection and misuse detection to detect various types of intrusions
  • 2. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 2, April 2013 72 effectively. To build powerful IDS, it is necessary to enumerate the desirable characteristics such as fault tolerance, imperviousness to subversion, scalability, adaptability, minimal overhead, configurability, graceful degradation of service. The rest of the paper is organized as follows. In section 2, we briefly describe about Data Mining and their related work for IDS. We put forth a detailed description of our algorithm in section 3. We discuss about the experimental results in section 4. In section 5, we summarize the paper. 2. DATA MINING TECHNOLOGY Data Mining is knowledge discovery in databases. Data Mining is knowledge discovery in databases. Data mining techniques are used to find out the hidden patterns automatically in an entire database. Data warehouse is an integration of multiple databases, data cubes and files. We have mined all the data, to predict it according to their relationship. Data mining is the search for the relationships and global patterns that exist in large databases but are hidden among vast amounts of data. It is also denoted as automated statistical analysis. The most commonly used techniques in data mining are: Neural networks, Genetic algorithms, Association rule mining, Clustering and Classification. The association rule mining technique is applied for our proposed work. 2.1. Related Work Ye Changguo [1] has described about Network Intrusion Detection System (IDS), as the main security defending technique, are second guard for a network after firewall. Ye Changguo [1] has described about Network Intrusion Detection System (IDS), as the main security defending technique, are second guard for a network after firewall. The author described that the huge database log can be mined with the help of fuzzy rule mining algorithm. It gives the better results compared to Apriori algorithm. Aly Ei-Senary et al[2] has integrated Apriori and Kuok’s algorithms to capture the features of network traffic using fuzzy logic rules. Amir Azimi alasti et al[3]says that the reduction of false positive alerts and correlation between alerts are done by formalized SOM. The accuracy can be improved by Alert Filtering and Cluster Merging algorithms. Anderson J. P.[4] using data mining techniques and signature based tools for MINDS. The model can be developed by Denning D.E et al[5] to monitor the abnormal activities. Dewan M et al[6] has used ISABA for alert classification and also to reduce the number of false positives. Each and every user behavior can be identified by Neural network by Jake Ryan et al[7]. Jin-Ling Zhao[8] proposed to achieve the high detection rate and low false alarm rate through clustering and genetic optimizing stages. Norouzian M.R et al[9] described the neural network concepts to detect various attacks and also to classify six groups of two hidden layers in Multi- Layer Perceptron (MLP). All the system calls to be traced out by Host based Intrusion Detection System. OSwais. S et al[10] proposed the membership function can be tuned by genetic algorithm, it is performed by using approach based IDS and also implemented by Gas. Alan Bivens et al[11] has proposed the NIDS model to classify self organizing maps for data clustering. The MLP neural network is one of the best ways to creating uniform, grouping of inputs and they are detected effectively when a dynamic number of inputs are presented. S. Sathyabama et al[12] has described about clustering techniques and outliers for grouping the user’s behaviors and also detecting different behaviors easily. Teng.H.S [13] applied sequential rules to capture a user’s behavior over time. According to the User activity patterns, the specific rules are used to find out the specific activities. High quality sequential patterns are automatically generated using inductive generalization and lower quality patterns are eliminated. An automated strategy for generation of fuzzy rules obtained from definite rules using frequent items. Taeshik Shon et al [14] proposed an enhanced SVM
  • 3. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 2, April 2013 73 approach framework for detecting and classifying the novel attacks in network traffic such as packet profiling using SOFM, packet filtering using PTF, field selection using Genetic Algorithm and packet flow-based data pre-processing. SOFM clustering was used for normal profiling. The SVM approach provides false positive rate similar to that of real NIDSs. Stephen F. Ownes, R. R. Levary[15] has stated that the expert system techniques are used for intrusion detection systems. The fuzzy sets are used to find out various types of attacks. Depends up on the types of threat it is easy to implement the expert system technology. In that specific problem, we wish to tackle through our IDS is, to generate a modernized intrusion detection which will effectively detects both anomaly and misuse detections using EAA (Enhanced Apriori Algorithm) and also will reduce false positives effectively. 3. ARCHITECTURE FRAMEWORK AND PROPOSED ENHANCED APRIORI ALGORITHM It is necessary to detect the potential attacks for anomalous behavior from the existing patterns because we predict the future actions of the attacker’s. Sequential pattern mining techniques are used to analyze various IDS alerts. In this paper, we propose a model modernized intrusion detection system consist of two methods, anomaly detection and misuse detection to detect intrusions. We have integrated both anomaly and misuse detection due to its ability to detect novel attacks. Our system is used to find out the behaviors of various attacks using EAA. In this paper we proposed to design and develop an intelligent data mining intrusion detection system and its core part a composite detection engine with anomaly detection and misuse detection features and the two detection engines work serially to detect the user's activity in turn. Figure 1. Design Architecture The real time data’s are collected from the database audit system. We have analyze the audit data and to find out its normal and abnormal behaviors. As a result, identify the abnormal activity through statistical analysis.
  • 4. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 2, April 2013 74 The design of architecture framework is mainly composed of the following parts: data collecting and pre-processing module, association rule mining module and intrusion detection analysis module, etc as shown in Figure 1. 3.1 The Proposed Algorithm - EAA In this section, we proposed the Enhanced Apriori Algorithm(EAA). It is an extension of basic Apriori Algorithm. Several rule sets are framed as follows. Rule 1 : If both anomaly and misuse module detected an attack then the specific attack can be classified by misuse module. Rule 2 : If misuse module can detect an attack then the specific attack can be classified by misuse module. Rule 3 : If anomaly module can detect an attack then the specific attack can be declared as unclassified attack. L1= {frequent candidates}; for (k= 2; Lk-1 !=∅; k++) do begin Ck= candidates are generated from Lk-1 (cartesian product Lk-1 x Lk-1 and eliminating any k-1 size itemset is not a frequent one); While LK-1≠ф Ck <- Generate(LK-1) For transactions t € T Ct, <- Subset(Ckt) For candidates c € Ct count[c] <- count[c] + 1 LK <- { c € Ck | count [c] >= € } K <- K+1 Return µ Lk for each transaction t in database do increment the count of all candidates in Ck that are contained in t Lk = candidates in Ck with min_sup end Return µ Lk; Let’s define: Ck candidate itemset of size k Lk frequent itemset of size k Main steps of iteration are: Find frequent set Lk-1 Join step: Ck is generated by joining Lk-1 with itself ( cartesian product Lk-1 x Lk-1 ) Prune step (apriori property): Any (k − 1) size itemset is not a frequent subset of k size itemset, then it should be removed Frequent set Lk has been achieved Figure 2. EAA Algorithm
  • 5. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 2, April 2013 75 Association Mining aims to extract interesting correlation, frequent patterns, and associations among sets of items or objects in transaction databases. Association rules satisfy both a minimum support threshold (min_sup) and minimum confidence threshold (min_conf). Audit data can be obtained from various databases, it consist of number of rows (audit record) and columns (system features). Association rules are used to capture the consistent behaviors and then it is implemented through aggregate rule sets. Our proposed algorithm is in pseudo code format. 4. EXPERIMENTAL RESULTS The proposed EAA is experimented to find out the efficiency of detecting false positives and false negatives that are occurred in IDS. The new type of attacks can be detected effectively by EAA and then automatically knowledge base can be updated. The experimental result shows, that it was better to find normal packet performance, faster in terms of execution time and also detecting the effectiveness and accuracy of false positives and false negatives. The input parameters are data size (The size of the each audit record in database) and Data Length (Processing time of each audit record measured in seconds). Our proposed technique EAA approach gives better performance in evaluating large size audit data when compared to the existing techniques. False Positive Rate = Number of false positives / Total number of abnormal labels. False Negative Rate = Number of false negatives / Total number of normal labels. Figure 3. Nodes without intrusion
  • 6. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 2, April 2013 76 Figure 4. Nodes with intrusion Table 1. Evaluation between existing and proposed Approach Data Size Data Length (Existing) Data Length (Proposed) 1876 34 10 876 56 13 4526 87 20 5435 35 27 987 65 11 1234 27 16 675 74 08 2345 55 22 5432 33 25 5261 23 23 2176 22 19 165 11 02 765 65 09 763 23 09 343 25 10 7845 64 33 This paper improves the detecting speed and accuracy as a goal, and proposed a more efficient EAA (Enhanced Apriori Algorithm) to abnormal detecting experiment to be based on network.
  • 7. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 2, April 2013 77 In this approach we shows that new type of attack can be detected effectively in the system and the knowledge base can be updated automatically. Finally the experimental results are compared and analyzed. Our proposed algorithm is effectively identify malicious attacks and also increase the efficiency. This section will shows the result based on the inputs as, Data Size: The size of the each audit record in database and Data Length: Processing time of each audit record measured in seconds. From the Figure 5. We can conclude that our proposed technique called EAA approach gives better performance in evaluating large size of audit data when compared to the existing techniques. Figure 5. Performance Analysis The IDS are evaluated on the basis of its accuracy, efficiency and usability. The characteristics used to evaluate the accuracy of the IDS are, Detection Rate: It is the percentage of attacks that a system detects and False Positive Rate: It is the percentage of normal data that the system in- correctly determines to be intrusive. Figure 6. Compression chart for false positives and false negatives
  • 8. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 2, April 2013 78 Different types of IDS can be analyzed according to the detection rate and it is plotted as a Receiver Operating Characteristic (ROC) curve. The accuracy gives a measure of the ability of the IDS to handle noisy, discrete data and to adapt. The compression range of false positives and false negatives are shown in Figure 6. The experimental results shows that the security range between existing and proposed technique based on the ratio (59:67) is in Figure 7. Figure 7. Performance Analysis for Existing and Proposed system An existing research, it is based on simple and basic association algorithm to enhance the efficiency of association rule mining, which is not sufficient one to generate frequent item set. Another problem is in fuzzy set theory, it is often requires several analysis before the number of frequent item set produce. It can be very sensitive to the choice of initial analysis and it does not yield the same result with each run, since the resulting frequent item set depends on the initial random assignments. So it is not sufficient for runtime intrusion detection efficiency. Reasons for Supremacy over other algorithms:- • Proposed Design will be better than existing to find normal packet performance. • Proposed Design will be faster than existing in terms of execution time. • Proposed Design will be smaller than existing and easy to understand and implement. • It will do not contain complex structure, control flow will be well defined and looping structure will be minimized. Due to the above facts it will take very less time for execution. It is a modern Intrusion Detection with Intelligent Analysis that meets the challenges that traditional intrusion detection systems failed to meet: • need for accuracy • need for active responses • need for speed and reliability • need for usability 5. CONCLUSION & FUTURE WORK Using advantages of characteristic extraction of data mining theory in dealing with large amounts of data, the new model MIDS which combines both misuse detecting and anomaly
  • 9. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 2, April 2013 79 detection is proposed in this paper. In this model we applying Enhanced Apriori (EAA) algorithm to the training data set that containing a large number of intrusions to establish and update the ‘normal’ and ‘abnormal’ behavior rules. It is, therefore, concluded that the given methods can be easily adapted to the configuration of MIDS to reduce the manual efforts used to configure them, reduce alert generation and hence improve their effectiveness. And the results of simulation manifested that the new model has a trait of high detection rate and low false positive rate. Besides, unknown intrusion can be detected at the same time effectively. In Future Enhancement, we investigate the methods and benefits of combining multiple simple detection models. In Future Enhancement, we investigate the methods and benefits of combining multiple simple detection models. We enhance this model by using multiple audit data sets from multiple data streams to improve the accuracy and efficiency. REFERENCES [1] Ye Changguo , “The Research on the Application of Association Rules Mining Algorithm in Network Intrusion Detection” Transactions on Software Engineering, IEEE Communication Magazine. [2] Aly Ei-Semary, Janica Edmonds, Jesus Gonzalez-Pino, Mauricio Papa, “Applying Data Mining of Fuzzy Association Rules to Network Intrusion Detection”, in the Proceedings of Workshop on Information Assurance United States Military Academy 2006, IEEE Communication Magazine, West Point, Y,DOI:10.1109/IAW.2006/652083. [3] Amir Azimi, Alasti, Ahrabi, Ahmad Habibizad Navin, Hadi Bahrbegi, “A New System for Clustering & Classification of Intrusion Detection System Alerts Using SOM”, International Journal of Computer Science & Security, Vol: 4, Issue: 6, pp-589-597, 2011. [4] Anderson.J.P, “Computer Security Threat Monitoring & Surveilance”, Technical Report, James P Anderson co., Fort Washington, Pennsylvania, 1980. [5] Denning .D.E, ”An Intrusion Detection Model”, Transactions on Software Engineering, IEEE Communication Magazine, 1987,SE-13, PP-222-232,DOI:10.1109/TSE.1987.232894. [6] Dewan Md, Farid, Mohammed Zahidur Rahman, “Anomaly Network Intrusion Detection Based on Improved Self Adaptive Bayesian Algorithm”, Journal of Computers, Vol 5, pp-23-31, Jan 2010, DOI:10.4.304/jcp 5.1. [7] Jake Ryan, Meng - Jang Lin, Risto Miikkulainen, ”Intrusion Detection With Neural Networks”, Advances in Neural Information Processing System 10, Cambridge, MA:MIT Press,1998,DOI:10.1.1.31.3570. [8] Jin-Ling Zhao, Jiu-fen Zhao ,Jian-Jun Li, “Intrusion Detection Based on Clustering Genetic Algorithm”, in Proceedings of International Conference on Machine Learning & Cybernetics (ICML),2005,IEEECommunicationMagazine,ISBN:0-7803-9091- DOI:10.1109/ICML.2005.1527621. [9] Norouzian.M.R, Merati.S, “Classifying Attacks in a Network Intrusion Detection System Based on Artificial Neural Networks”, in the Proceedings of 13th International Conference on Advanced Communication Technology(ICACT), 2011,ISBN:978-1-4244-8830-8,pp-868-873. [10] Oswais.S, Snasel.V, Kromer.P, Abraham. A, “Survey: Using Genetic Algorithm Approach in Intrusion Detection Systems Techniques”, in the Proceedings of 7th International Conference on Computer Information & Industrial Management Applications (CISIM), 2008, International Journal of Computer Applications (0975 – 8887) Volume 35– No.8, December 2011 56 IEEE Communication Magazine,pp-300-307,ISBN:978-0-7695-318-7,DOI:10.1109/CISM.2008-49. [11] Alan Bivens, Chandrika Palagiri, Rasheda Smith, Boleslaw Szymanski, ”Network-Based Intrusion Detection Using Neural Networks”, in Proceedings of the Intelligent Engineering Systems Through Artificial Neural Networks, St.Louis, ANNIE-2002, and Vol: 12, pp- 579-584, ASME Press, New York.
  • 10. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 2, April 2013 80 [12] Sathyabama.S, Irfan Ahmed.M.S, Saravanan.A,”Network Intrusion Detection Using Clustering: A Data Mining Approach”, International Journal of Computer Application (0975-8887), Sep- 2011, Vol: 30, No: 4, ISBN: 978-93-80864-87-5, DOI: 10.5120/3670-5071. [13] Teng.H.S, Chen.K and Lu.S.C, “Adaptive Real-Time Anomaly Detection using Inductively Generated Sequential Patterns, in the Proceedings of Symposium on research in Computer Security & Privacy, IEEE Communication Magazine,1990, pp-278-284. [14] Taeshik Shon, Jong Sub Moon, “A Hybrid Machine Learning Approach to Network Anomaly Detection”, Information Sciences 2007, Vol: 177, Issue: 18, Publisher: USENIX Association, pp- 3799-3821, ISSN:00200255,DOI:10.1016/j.ins-2007.03.025. [15] Stephen F. Owens, Reuven R. Levary, "An adaptive expert system approach for intrusion detection", International Journal of Security and Networks, Vol: 1, No: 3/4, pp: 206-217, 2006. [16] Tcptrace software tool, www.tcptrace.org. [17] SNORT Intrusion Detection System. www.snort.org. [18] Sans Institute. The SANS Security Policy Project. http://www.sans.org/newlook/resources/policies/policies.htm Authors Author 1 : Lalli. M is working as a Assistant Professor in the Department of Computer Science & Engg., Bharathidasan University, Trichy, Tamil Nadu, India. She has 10 Years of experience in teaching. Her area of interest is Manets. Other areas of on interest include Information Security and Computer Networks and she is pursuing Ph.D in mobile Ad-hoc network security under the guidance of Dr. V. Palanisamy. Author 2. Palanisamy.V is working as a Head of the Department of Computer Science & Engg Alagappa university. Karaikudi, Tamil Nadu, India. He has 20 Years of Teaching and 15 Years of experience in research. His area of Specialization is Wireless networks and network security. Other areas of an interest is include Algorithms.