220
Views
7
CrossRef citations to date
0
Altmetric
Original Articles

Detection of Attacks for IDS using Association Rule Mining Algorithm

&

REFERENCES

  • S. Devaraju, and S. Ramakrishnan, “Performance comparison of intrusion detection system using various techniques – A review,” ICTACT J. Commun. Technol., Vol. 4, no. 3, pp. 802–12, Sep. 2013.
  • Y. Qing, W. Xiaoping, and H. Gaofeng, “An intrusion detection approach based on data mining,” in 2nd International Conference on Future Computer and Communication (ICFCC), Wuhan, China, Vol. 1, May 21–24, 2010, pp. 695–8.
  • M. Wang, and A. Zhao, “Investigations of intrusion detection based on data mining”, in Springer Recent Advances in Computer Science and Information Engineering. Lecture Notes in Electrical Engineering, Vol. 124, 2012, pp. 275–9.
  • S. T. Sarasamma, Q. A. Zhu, and J. Huff, “Hierarchical Kohonenen net for anomaly detection in network security,” IEEE Trans. Syst. Man Cybern., Vol. 35, no. 2, pp. 302–12, Apr. 2005.
  • S. Devaraju, and S. Ramakrishnan, “Performance analysis of intrusion detection system using various neural network classifiers,” in IEEE Proceedings of the International Conference on International Conference on Recent Trends in Information Technology (ICRTIT 2011), Chennai, India, June 3–5, 2011, pp. 1033–8.
  • E. Anbalagan, C. Puttamadappa, E. Mohan, B. Jayaraman, and S. Madane, “Datamining and intrusion detection using back-propagation algorithm for intrusion detection,” Int. J. Soft Comput., Vol. 3, no. 4, pp. 264–70, 2008.
  • G. V. Nadiammai, and M. Hemalatha, “Effective approach toward intrusion detection system using data mining techniques,” Elsevier Egypt. Inform. J., Vol. 15, pp. 37–50, 2014.
  • N. B. Anuar, H. Sallehudin, A. Gani, and O. Zakari, “Identifying false alarm for network intrusion detection system using hybrid data mining and decision tree,” Malay. J. Comput. Sci., Vol. 21, no. 2, pp. 101–15, 2008.
  • S. Mabu, C. Chen, N. Lu, K. Shimada, and K. Hirasawa, “An intrusion-detection model based on fuzzy class-association-rule mining using genetic network programming,” IEEE Trans. Syst. Man Cybern. C, Vol. 41, no. 1, pp. 130–9, Jan. 2011.
  • L. Hanguang, and N. Yu, “Intrusion detection technology research based on apriori aogorithm,” in International Conference on Applied Physics and Industrial Engineering, Vol. 24, 2012, pp. 1615–20.
  • M. Jiang, X. Gan, C. Wang, and Z. Wang, “Research of the intrusion detection model based on data mining,” in Elsevier Energy Procedia, Vol. 13, 2011.
  • A. P. Muniyandi, R. Rajeswari, and R. Rajaram, “Network anomaly detection by cascasding K-means clustering and C4.5 decision tree algorithm,” in International Conference on Communication Technology and System Design, Vol. 30, pp. 174–82, 2012.
  • KDD Cup 1999 Intrusion Detection Data, http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html, 2010.
  • Mansour Sheikhan, Zahra Jadidi, and Ali Farrokhi, Intrusion Detection Using Reduced-Size RNN Based on Feature Grouping. London: Springer-Verlag, Nov. 2010.
  • S. Devaraju, and S. Ramakrishnan, “Performance comparison for intrusion detection system using neural network with KDD dataset,” ICTACT J. Soft Comput., Vol. 4, no. 3, pp. 743–52, 2014.
  • Shih-Wei Lin, Kuo-Ching Ying, Chou-Yuan Lee, and Zne-Jung Lee, “An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection,” Elsevier Appl. Soft Comput., Vol. 12, no. 10, pp. 3285–90, Oct. 2012.
  • L. M. L. de Campos, R. C. L. de Oliveira, and M. Roisenberg, “Network intrusion detection system using data mining,” in Springer Engineering Applications of Neural Networks Communications in Computer and Information Science, Vol. 311, 2012, pp. 104–13.
  • S. Devaraju and S. Ramakrishnan, “Detection of accuracy for intrusion detection system using neural network classifier,” Int. J. Emerg. Technol. Advan. Eng., ISSN 2250-2459 (Online), Vol. 3, Spl Iss. 1, pp. 338–45, Jan. 2013.
  • N. S. Abouzakhar, and G. A. Manson, “Evaluation of intelligent intrusion detection models,” Int. J. Digit. Evid. Summer, Vol. 3, no. 1, pp. 1–20, 2004.
  • S.-J. Horng, M.-Y. Su, Y.-H. Chen, T.-W. Kao, R.-J. Chen, J.-L. Lai, and C. D. Perkasa, “A novel intrusion detection system based on hierarchical clustering and support vector machines,” Expert Syst. Appl., Vol. 38, pp. 306–13, 2011.
  • S. S. Kandeeban, and R. S. Rajesh, “A genetic algorithm based elucidation for improving intrusion detection through condensed feature set by KDD 99 data set,” Inf. Knowledge Manag., Vol 1, no. 1, pp. 1–9, 2011.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.