2 research outputs found

    Intrusion Detection System: A Survey Using Data Mining and Learning Methods

    Get PDF
    In spite of growing information system widely, security has remained one hard-hitting area for computers as well as networks. In information protection, Intrusion Detection System (IDS) is used to safeguard the data confidentiality, integrity and system availability from various types of attacks. Data mining is an efficient artifice applied to intrusion detection to ascertain a new outline from the massive network data as well as it used to reduce the strain of the manual compilations of the normal and abnormal behavior patterns. Intrusion Detection System (IDS) is an essential method to protect network security from incoming on-line threats. Machine learning enable automates the classification of network patterns. This piece of writing reviews the present state of data mining techniques and compares various data mining techniques used to implement an intrusion detection system such as, Support Vector Machine, Genetic Algorithm, Neural network, Fuzzy Logic, Bayesian Classifier, K- Nearest Neighbor and decision tree Algorithms by highlighting a advantage and disadvantages of each of the techniques. This paper review the learning and detection methods in IDS, discuss the problems with existing intrusion detection systems and review data reduction techniques used in IDS in order to deal with huge volumes of audit data. Finally, conclusion and recommendation are included. Keywords: Classification, Data Mining, Intrusion Detection System, Security, Anomaly Detection, Types of attacks, Machine Learning Technique

    ESTUDIO COMPARATIVO DE T脡CNICAS DE ENTRENAMIENTO Y CLASIFICACI脫N EN SISTEMAS DE DETECCI脫N DE INSTRUSOS (IDS), BASADOS EN ANOMALIAS DE RED.

    Get PDF
    Maestr铆a en Ingenier铆a (脡nfasis en Redes y Software)The main motivation of this investigation was the implementation of the Draper method applied to intrusion detection systems in different training and classification techniques in order to identify the best intrusion detection model with the objective of improving detection rates of attacks in computer network systems, using a procedure of selection of characteristics and different methods of algorithms of unsupervised trainings, in this case was used the technique INFO.GAIN identifying that the number of optimal characteristics is 15. Consequently, a neural network using a non-supervised learning algorithm (GHSOM, RANDOM FOREST, BAYESIAN NETWORKS, NAIVE BAYES, C4.5, LOGISTIC, PART AND NBTREE) for the purpose of classifying bi-class traffic automatically. obtained the best technique of training and classification using the selection technique In INFO.GAIN with 15 characteristics and cross validation 10 pligues, was the RANDOM FOREST technique.La principal motivaci贸n de esta investigaci贸n ha sido la implementaci贸n del m茅todo Draper aplicado a los sistemas de detecci贸n de intrusos en distintas t茅cnicas de entrenamiento y clasificaci贸n con el prop贸sito de identificar el mejor modelo de detecci贸n de intrusiones con el objetivo de mejorar las tasas de detecci贸n de ataques en sistemas de redes computacionales, utilizando un procedimiento de selecci贸n de caracter铆sticas y distintos m茅todos de algoritmos de entrenamientos no supervisados, en este caso se utiliz贸 la t茅cnica INFO.GAIN identificando que el n煤mero de caracter铆sticas 贸ptimo es 15. En consecuencia, se entren贸 una red neuronal que utilizan un algoritmo de aprendizaje no supervisado (GHSOM, RANDOM FOREST, REDES BAYESIANAS, NAIVE BAYES, C4.5,LOGISTIC, PART Y NBTREE ), con el prop贸sito de clasificar el tr谩fico bi-clase de forma autom谩tica, Como resultado se obtuvo que la mejor t茅cnica de entrenamiento y clasificaci贸n utilizando la t茅cnica de selecci贸n INFO.GAIN a 15 caracter铆sticas y validaci贸n cruzada 10 pligues, fue la t茅cnica RANDOM FOREST
    corecore