(Publisher of Peer Reviewed Open Access Journals)

International Journal of Advanced Technology and Engineering Exploration (IJATEE)

ISSN (Print):2394-5443    ISSN (Online):2394-7454
Volume-5 Issue-46 September-2018
Full-Text PDF
DOI:10.19101/IJATEE.2018.545024
Paper Title : A review on intrusion detection system based on data mining and evolutionary algorithms
Author Name : Ravindra Gupta and Shailendra Singh
Abstract :

Intrusion detection is the procedure for determining intrusions in the network. This paper explores the methodology in the direction of intrusion detection system. It explores the possibility of enhancement and propounding the advantages. This study helps in exploring the method analytically, methodically and experimentally. This paper lists the gaps and the advantages, so that future framework can be design to enhance the efficiency. It also provides the detail discussion based on the attributes and parameters variations. Finally future suggestions have been listed.

Keywords : Data mining, Evolutionary algorithms, Intrusion detection, Network system.
Cite this article : Ravindra Gupta and Shailendra Singh, " A review on intrusion detection system based on data mining and evolutionary algorithms " , International Journal of Advanced Technology and Engineering Exploration (IJATEE), Volume-5, Issue-46, September-2018 ,pp.356-361.DOI:10.19101/IJATEE.2018.545024
References :
[1]Jianliang M, Haikun S, Ling B. The application on intrusion detection based on k-means cluster algorithm. In international forum on information technology and applications 2009 (pp. 150-2). IEEE.
[Crossref] [Google Scholar]
[2]Sharma N, Gaur B. An approach for efficient intrusion detection for KDD dataset: a survey. International Journal of Advanced Technology and Engineering Exploration. 2016; 3(18):72-6.
[Crossref] [Google Scholar]
[3]Mohamed MH, Waguih HM. A proposed academic advisor model based on data mining classification techniques. International Journal of Advanced Computer Research. 2018; 8(36):129-36.
[Crossref] [Google Scholar]
[4]Tian L, Jianwen W. Research on network intrusion detection system based on improved k-means clustering algorithm. In international forum on computer science-technology and applications 2009 (pp. 76-9). IEEE.
[Crossref] [Google Scholar]
[5]Conteh NY, Schmick PJ. Cybersecurity: risks, vulnerabilities and countermeasures to prevent social engineering attacks. International Journal of Advanced Computer Research. 2016; 6(23):31-8.
[Crossref] [Google Scholar]
[6]Farhaoui Y. How to secure web servers by the intrusion prevention system (IPS). International Journal of Advanced Computer Research. 2016; 6(23):65-71.
[Crossref] [Google Scholar]
[7]Irandegani M, Bagherizadeh M. Designing an asynchronous multi-channel media access control protocol based on service quality for wireless sensor networks. International Journal of Advanced Computer Research. 2017; 7(32):190-9.
[Crossref] [Google Scholar]
[8]Devaraju S, Ramakrishnan S. Performance analysis of intrusion detection system using various neural network classifiers. International conference on recent trends in information technology (ICRTIT) 2011 (pp. 1033-8).
[Google Scholar]
[9]Brugger ST. Data mining methods for network intrusion detection. University of California at Davis. 2004.
[Google Scholar]
[10]Sirisha GN, Shashi M. Subspace clustering for high dimensional datasets. International Journal of Advanced Computer Research. 2016; 6(26):177-84.
[Crossref] [Google Scholar]
[11]Murugavalli S, Jainulabudeen SA, Kumar GS, Anuradha D. Enhancing security against hard AI problems in user authentication using CAPTCHA as graphical passwords. International Journal of Advanced Computer Research. 2016; 6(24):93-9.
[Crossref] [Google Scholar]
[12]Lee W, Stolfo SJ. Data mining approaches for intrusion detection. In USENIX security symposium 1998 (pp. 79-93).
[Google Scholar]
[13]Nalavade K, Meshram BB. Mining association rules to evade network intrusion in network audit data. International Journal of Advanced Computer Research. 2014; 4(15):560-7.
[Google Scholar]
[14]Naoum R, Aziz S, Alabsi F. An enhancement of the replacement steady state genetic algorithm for intrusion detection. International Journal of Advanced Computer Research. 2014; 4(15):487-94.
[Google Scholar]
[15]Lee W, Stolfo SJ, Mok KW. A data mining framework for building intrusion detection models. In proceedings of the symposium on security and privacy 1999 (pp. 120-32). IEEE.
[Crossref] [Google Scholar]
[16]Tiwari R, Sinhal A. Block based text data partition with RC4 encryption for text data security. International Journal of Advanced Computer Research. 2016; 6(24):107-13.
[Crossref] [Google Scholar]
[17]Sperotto A, Schaffrath G, Sadre R, Morariu C, Pras A, Stiller B. An overview of IP flow-based intrusion detection. IEEE Communications Surveys and Tutorials. 2010; 12(3):343-56.
[Crossref] [Google Scholar]
[18]Li Z, Li Y, Xu L. Anomaly intrusion detection method based on k-means clustering algorithm with particle swarm optimization. In international conference on information technology, computer engineering and management sciences 2011 (pp. 157-61). IEEE.
[Crossref] [Google Scholar]
[19]Manimaran A, Durairaj M. The conjectural framework for detecting DDoS attack using enhanced entropy based threshold technique (EEB-TT) in cloud environment. International Journal of Advanced Computer Research. 2016; 6(27):230-7.
[Crossref] [Google Scholar]
[20]Yin-huan LI. Design of intrusion detection model based on data mining technology. In international conference on industrial control and electronics engineering 2012 (pp. 571-4). IEEE.
[Crossref] [Google Scholar]
[21]Prasenna P, Kumar RK, Ramana AR, Devanbu A. Network programming and mining classifier for intrusion detection using probability classification. In international conference on pattern recognition, informatics and medical engineering 2012 (pp. 204-9). IEEE.
[Crossref] [Google Scholar]
[22]Han LI. Using a dynamic K-means algorithm to detect anomaly activities. In seventh international conference on computational intelligence and security 2011 (pp. 1049-52). IEEE.
[Crossref] [Google Scholar]
[23]Benaicha SE, Saoudi L, Guermeche SE, Lounis O. Intrusion detection system using genetic algorithm. In science and information conference (SAI) 2014 (pp. 564-8). IEEE.
[Crossref] [Google Scholar]
[24]Thaseen IS, Kumar CA. Intrusion detection model using fusion of PCA and optimized SVM. In international conference on contemporary computing and informatics 2014 (pp. 879-84). IEEE.
[Crossref] [Google Scholar]
[25]Wagh SK, Kolhe SR. Effective intrusion detection system using semi-supervised learning. In international conference on data mining and intelligent computing 2014 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[26]Sayar AA, Pawar SN, Mane V. A review of intrusion detection system in computer network. International Journal of Computer Science and Mobile Computing. 2014; 3(2):700-3.
[Google Scholar]
[27]Bahl S, Sharma SK. Improving classification accuracy of intrusion detection system using feature subset selection. In international conference on advanced computing & communication technologies 2015 (pp. 431-6). IEEE.
[Crossref] [Google Scholar]
[28]Yan C. Intelligent intrusion detection based on soft computing. In international conference on measuring technology and mechatronics automation 2015 (pp. 577-80). IEEE.
[Crossref] [Google Scholar]
[29]Haidar GA, Boustany C. High perception intrusion detection system using neural networks. In international conference on complex, intelligent, and software intensive systems 2015 (pp. 497-501). IEEE.
[Crossref] [Google Scholar]
[30]Kumar GR, Mangathayaru N, Narsimha G, Reddy GS. Evolutionary approach for intrusion detection. In international conference on engineering & MIS 2017 (pp. 1-6). IEEE.
[Crossref] [Google Scholar]
[31]Ding S, Wang G. Research on intrusion detection technology based on deep learning. In international conference on computer and communications 2017 (pp. 1474-8). IEEE.
[Crossref] [Google Scholar]
[32]Xiaofeng Z, Xiaohong H. Research on intrusion detection based on improved combination of K-means and multi-level SVM. In international conference on communication technology 2017 (pp. 2042-5). IEEE.
[Crossref] [Google Scholar]
[33]Potteti S, Parati N. Intrusion detection system using hybrid fuzzy genetic algorithm. In international conference on trends in electronics and informatics 2017 (pp. 613-8). IEEE.
[Crossref] [Google Scholar]
[34]Balasaraswathi VR, Sugumaran M, Hamid Y. Feature selection techniques for intrusion detection using non-bio-inspired and bio-inspired optimization algorithms. Journal of Communications and Information Networks. 2017; 2(4):107-19.
[Crossref] [Google Scholar]
[35]Shah V, Aggarwal AK, Chaubey N. Performance improvement of intrusion detection with fusion of multiple sensors. Complex & Intelligent Systems. 2017; 3(1):33-9.
[Crossref] [Google Scholar]
[36]Almiani M, Ghazleh AA, Al-Rahayfeh A, Razaque A. Intelligent intrusion detection system using clustered self-organized map. In international conference on software defined systems 2018 (pp. 138-44). IEEE.
[Crossref] [Google Scholar]
[37]Anwer HM, Farouk M, Abdel-Hamid A. A framework for efficient network anomaly intrusion detection with features selection. In international conference on information and communication systems 2018 (pp. 157-62). IEEE.
[Crossref] [Google Scholar]
[38]Pamukov ME, Poulkov VK. Multiple negative selection algorithm: improving detection error rates in IoT intrusion detection systems. In international conference on intelligent data acquisition and advanced computing systems: technology and applications 2017 (pp. 543-7). IEEE.
[Crossref] [Google Scholar]
[39]Desai AS, Gaikwad DP. Real time hybrid intrusion detection system using signature matching algorithm and fuzzy-GA. In international conference on advances in electronics, communication and computer technology 2016 (pp. 291-4). IEEE.
[Crossref] [Google Scholar]
[40]Maske SA, Parvat TJ. Advanced anomaly intrusion detection technique for host based system using system call patterns. In international conference on inventive computation technologies 2016 (pp. 1-4). IEEE.
[Crossref] [Google Scholar]
[41]Garg A, Maheshwari P. Performance analysis of snort-based intrusion detection system. In international conference on advanced computing and communication systems 2016 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[42]Mehmood T, Rais HB. Machine learning algorithms in context of intrusion detection. In international conference on computer and information sciences 2016 (pp. 369-73). IEEE.
[Crossref] [Google Scholar]
[43]Gupta D, Singhal S, Malik S, Singh A. Network intrusion detection system using various data mining techniques. In international conference on research advances in integrated navigation systems 2016 (pp. 1-6). IEEE.
[Crossref] [Google Scholar]