A Literature Survey on the Network Security and Intrusion Detection System Using Data Mining Techniques

Authors

  • R. Dharmarajan Research Scholar, Department of Computer Science, Manonmaniam Sundaranar University, Tamil Nadu
  • V. Thiagarasu Associate Professor, Department of Computer Science, Gobi Arts and Science College, Erode, Tamil Nadu

DOI:

https://doi.org/10.51983/ajcst-2019.8.1.2127

Keywords:

Network Security, Cloud Computing, Sensor Networks, Ad Hoc Networks, Internet of Things

Abstract

Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology. The entire field of network security is vast and in an evolutionary stage. The range of study encompasses a brief history dating back to internet’s beginnings and the current development in network security. In order to understand the research being performed today, background knowledge of the importance of security, types of attacks in the networks. This paper elaborates the literature study on network security in various domains. Finally, it summarizes the research directions by literature survey.

References

S.-J. Horng, M.-Y. Su, Y.-H. Chen, T.-W. Kao, R.-J. Chen, J.-L. Lai, C. D. Perkasa, "A novel intrusion detection system based on hierarchical clustering and support vector machines," Elsevier Computer Network, pp. 306–313, 2010.

M. Wazid, "Hybrid Anomaly Detection using K-Means Clustering in Wireless Sensor Networks," Center for Security, Theory and Algorithmic Research, pp. 1-17, 2014.

Y.-J. Shen and M.-S. Wang, "Broadcast scheduling in wireless sensor networks using fuzzy hopfield neural network," Expert Systems with Applications, vol. 34, no. 2, pp. 900-907, 2008.

Y. Wang, M. Martonosi, and L.-S. Peh, "Predicting link quality using supervised learning in wireless sensor networks," ACM SIGMOBILE Mobile Computing and Communications Review, vol. 11, no. 3, pp. 71–83, 2007.

M. Malik, N. Kapoor, E. Naryan, A. P. Singh, "Rule Based Technique detecting Security attack for Wireless Sensor network using fuzzy logic," International Journal of Advanced Research in Computer Engineering & Technology, vol. 1, no. 4, ISSN: 2278–1323, June 2012.

R. M. Elbasiony, E. A. Sallam, T. E. Eltobely, M. M. Fahmy, "A hybrid network intrusion detection framework based on random forests and weighted k-means," Ain Shams Engineering Journal, vol. 4, pp. 753–762, 2013.

L. Koc, T. A. Mazzuchi, S. Sarkani, "A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier," Elsevier, pp. 13492–13500, 2012.

W. Feng, Q. Zhang, G. Hu, J. X. Huang, "Mining network data for intrusion detection through combining SVMs with ant colony networks," Elsevier, pp. 127-140, 2013.

M. Bandgar, K. Dhurve, S. Jadhav, V. Kayastha, Prof. T. J. Parvat, "Intrusion Detection System using Hidden Markov Model (HMM)," IOSR Journal of Computer Engineering (IOSRJCE), e-ISSN: 2278-0661, p-ISSN: 2278- 8727, vol. 10, no. 3, pp. 66-70, Mar. – Apr. 2013.

D. Tran, W. Ma, D. Sharma, "Network Anomaly Detection using Fuzzy Gaussian Mixture Models," International Journal of Future Generation Communication and Networking, pp. 37-42, 2012.

V. Golmah, "An Efficient Hybrid Intrusion Detection System based on C5.0 and SVM," International Journal of Database Theory and Application, vol. 7, no. 2, pp. 59-70, 2014.

P. Mulak, N. R. Talhar, "Novel Intrusion Detection System Using Hybrid Approach," International Journal of Advanced Research in Computer Science and Software Engineering, vol. 4, no. 11, ISSN: 2277 128X, November 2014.

V. S. Takkellapati, G. V. S. N. R. V. Prasad, "Network Intrusion Detection system based on Feature Selection and Triangle area Support Vector Machine," International Journal of Engineering Trends and Technology, vol. 3, 2012.

V. Kosamkar, S. S. Chaudhari, "Improved Intrusion Detection System using C4.5 Decision Tree and Support Vector Machine," International Journal of Computer Science and Information Technologies, vol. 5, no. 2, pp. 1463-1467, 2014.

H. Kaur, R. Kaur, "Crossbreed Routing Protocol for SPEED Terminology in Wireless Sensor Networks," International Journal of Advance Research in Computer Science and management Studies, vol. 2, no. 7, ISSN: 2321-7782, July 2014.

H. Oh, I. Doh and K. Chae, "Attack classification based on data mining technique and its application for reliable medical sensor communication," International Journal of Computer Science and Applications, vol. 6, no. 3, pp. 20-32, 2009.

N. Ye and X. Li, "A Scalable Clustering Technique for Intrusion Signature Recognition," Proceedings of 2001 IEEE Workshop on Information Assurance and Security, 2001.

G. Singh, F. Masseglia, C. Fiot, A. Marascu and P. Poncelet, "Data Mining for Intrusion Detection: from Outliers to True Intrusions," The 13th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD’09), Thailand, 2009.

K. Faraoun and A. Boukelif, "Genetic Programming Approach for Multi-Category Pattern Classification Applied to Network Intrusions Detection," The International Arab Journal of Information Technology, vol. 4, no. 3, 2007.

W. Lee, S. Stolfo, P. Chan, E. Eskin, W. Fan, M. Miller, S. Hershkop and J. Zhang, "Real Time Data Mining-based Intrusion Detection," Proceedings of DISCEX II, June 2001.

K. Ioannis, T. Dimitriou and F. C. Freiling, "Towards Intrusion Detection in Wireless Sensor Networks," 13th European Wireless Conference, Paris, April 2007.

D. Farid, J. Darmont, N. Harbi, N. Hoa and M. Rahman, "Adaptive Network Intrusion Detection Learning: Attribute Selection and Classification," International Conference on Computer Systems Engineering (ICCSE 09), Bangkok, Thailand, December 2009.

J. Zhang and M. Zulkernine, "Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection," Symposium on Network Security and Information Assurance-Proc. of the IEEE International Conference on Communications (ICC), Istanbul, Turkey, June, 2006.

M. Tavallaee, E. Bagheri, W. Lu and A. Ghorbani, "A Detailed Analysis of the KDD’99 CUP Data Set," The 2nd IEEE Symposium on Computational Intelligence Conference for Security and Defense Applications (CISDA), 2009.

M. Campos and B. Milenova, "Creation and Deployment of Data Mining-Based Intrusion Detection Systems in Oracle Database 10g," an online document at http://www.oracle.com/technology/products/bi/odm/pdf/odm_based_intrusion_detection_paper_1205.pdf.

Prothives and S. Srinoy, "Integrating ART and Rough Set Approach for Computer Security," Proceedings of the International Multi Conference of Engineers and Computer Scientists, vol. 1, 2009.

H. Güneş Kayacık, A. Nur Zincir-Heywood and M. I. Heywood, "Selecting features for intrusion detection: a feature relevance analysis on KDD’99 intrusion detection datasets," Third Annual Conference on Privacy, Security and Trust, October 2005.

M. Amini and R. Jalili, "Network-based intrusion detection using unsupervised adaptive resonance theory (ART)," Proceedings of the fourth conference on engineering of intelligent systems (EIS 2004), Madeira, Portugal, 2004.

J. Xiao and H. Song, "A Novel Intrusion Detection Method Based on Adaptive Resonance Theory and Principal Component Analysis," Proceedings of the 2009 International Conference on Communications and Mobile Computing, vol. 3, 2009.

Skoudis, Ed, and Tom Liston, "Counter hack reloaded: a step-by-step guide to computer attacks and effective defenses," Prentice Hall Press, 2005.

K. Labib and V. Rao Vemuri, "Detecting Denial-of-Service And Network Probe Attacks Using Principal Component Analysis," In Third Conference on Security and Network Architectures, La Londe, (France), 2004.

T. Eldos, M. Khubeb Siddiqui and A. Kanan, "On the KDD’99 Dataset: Statistical Analysis for Feature Selection," Journal of Data Mining and Knowledge Discovery, 2012.

Downloads

Published

05-01-2019

How to Cite

Dharmarajan, R., & Thiagarasu, V. (2019). A Literature Survey on the Network Security and Intrusion Detection System Using Data Mining Techniques. Asian Journal of Computer Science and Technology, 8(1), 7–12. https://doi.org/10.51983/ajcst-2019.8.1.2127