Download Abstract-The paper`s object is to develop a network intrusion

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Nonlinear dimensionality reduction wikipedia , lookup

K-nearest neighbors algorithm wikipedia , lookup

Transcript
Network Intrusion Detection System Model Based on
Data Mining
Abstract-The paper’s object is to develop a network intrusion detection model based on data
mining technology, which can detect known intrusion effectively and has a good capacity to
recognize unknown data schema which can’t be detected effectively in traditional IDS. The
paper mainly does the following work: by analyzing the intrusion deeply, extract the properties
which can reflect intrusion characteristics effectively; combine misuse detection, anomaly
detection and human intervention, establish rule library based on C.45 decision tree algorithm
and use the optimal pattern matching so as to improve detection rate; the hosts are clustered to be
IP group based on visit number by means clustering algorithm, the audit data are divided into
parts under the IP group’s direction, and the classifiers are built up by divided audit data
respectively, then the detected Data apply different rules according to their own IP group,
thereby reduce false positives. The experiments proved that the method is effective to detect
intrusion such as scanning and Deny of Service.
EXISTING SYSTEM:
As the need of internet is increasing day by day, the significance of security is also
increasing. The enormous usage of internet has greatly affected the security of the system.
Hackers do monitor the system minutely or keenly, therefore the security of the network is under
observation. A conventional intrusion detection technology indicates more limitation like low
detection rate, high false alarm rate and so on. Performance of the classifier is an essential
concern in terms of its effectiveness; also number of feature to be examined by the IDS should
be improved. In our work, we have proposed two techniques, C4.5 Decision tree algorithm and
C4.5 Decision tree with Pruning, using feature selection. In C4.5 Decision tree with pruning we
have considered only discrete value attributes for classification. We have used KDDCup'99 and
NSL_KDD dataset to train and test the classifier. The Experimental Result shows that, C4.5
decision tree with pruning approach is giving better results with all most 98% of accuracy.
DISADVANTAGE:
 A conventional intrusion detection technology indicates more limitation like low
detection rate, high false alarm rate
PROPOSED SYSTEM:
Experimental results show that to establish data mining based intrusion detection system,
the prior knowledge of security is very important. Data mining can only extract rules from the
limited raw data, but not all the rules are reasonable. It is necessary that the expert with computer
safety knowledge provides evidence to guide its work. Furthermore, diversification detection
means should be promoted. High detection rate in the experiment shows that the methods are
feasible such as combining misuse detection and anomaly detection together, data distribution
and so on.
ADVANTAGE:
 Data mining can only extract rules from the limited raw data, but not all the rules are
reasonable.
SYSTEM REQUIREMENTS
HARDWARE REQUIREMENTS:
 Processor
-
Pentium –IV
 Speed
-
1.1 Ghz
 Ram
-
1GB
 Hard Disk
-
200 GB
 Key Board
-
Standard Windows Keyboard
 Mouse
-
Two or Three Button Mouse
 Monitor
-
SVGA
SOFTWARE REQUIREMENTS:
 Operating System
:
Windows XP/ 7
 Coding Language
:
Java
 Database
:
My SQL