Open Access   Article Go Back

Intrusion Detection System Based on Modified K-Means Clustering Algorithm

Nipjyoti Sarma1 , Sabyasachi Roy2 , Jyoti Nath3 , Ashapurna Sarma4 , Himakshi Bora5

Section:Research Paper, Product Type: Journal Paper
Volume-04 , Issue-07 , Page no. 34-37, Dec-2016

Online published on Dec 09, 2016

Copyright © Nipjyoti Sarma, Sabyasachi Roy, Jyoti Nath, Ashapurna Sarma, Himakshi Bora . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Nipjyoti Sarma, Sabyasachi Roy, Jyoti Nath, Ashapurna Sarma, Himakshi Bora, “Intrusion Detection System Based on Modified K-Means Clustering Algorithm,” International Journal of Computer Sciences and Engineering, Vol.04, Issue.07, pp.34-37, 2016.

MLA Style Citation: Nipjyoti Sarma, Sabyasachi Roy, Jyoti Nath, Ashapurna Sarma, Himakshi Bora "Intrusion Detection System Based on Modified K-Means Clustering Algorithm." International Journal of Computer Sciences and Engineering 04.07 (2016): 34-37.

APA Style Citation: Nipjyoti Sarma, Sabyasachi Roy, Jyoti Nath, Ashapurna Sarma, Himakshi Bora, (2016). Intrusion Detection System Based on Modified K-Means Clustering Algorithm. International Journal of Computer Sciences and Engineering, 04(07), 34-37.

BibTex Style Citation:
@article{Sarma_2016,
author = {Nipjyoti Sarma, Sabyasachi Roy, Jyoti Nath, Ashapurna Sarma, Himakshi Bora},
title = {Intrusion Detection System Based on Modified K-Means Clustering Algorithm},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2016},
volume = {04},
Issue = {07},
month = {12},
year = {2016},
issn = {2347-2693},
pages = {34-37},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=149},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=149
TI - Intrusion Detection System Based on Modified K-Means Clustering Algorithm
T2 - International Journal of Computer Sciences and Engineering
AU - Nipjyoti Sarma, Sabyasachi Roy, Jyoti Nath, Ashapurna Sarma, Himakshi Bora
PY - 2016
DA - 2016/12/09
PB - IJCSE, Indore, INDIA
SP - 34-37
IS - 07
VL - 04
SN - 2347-2693
ER -

           

Abstract

Due to the growth of Information Systems, different types of electronic attacks are happening day by day. This leads to the security breach rising every day Therefore it is of utmost important to protect highly sensitive and private information by securing the data. An intrusion detection system (IDS) monitors network or system activities and for nasty activities produces reports to a management. It monitors network traffic and its suspicious behaviour against security. Different types of intrusion detection methodologies are available, but all the current IDS are not perfect. Now a day’s Data mining concepts are used in the area of research in intrusion detection implementation. This paper tries to forward an idea of modifying the traditional K- means algorithm using fuzzy concept to prepare a model of intrusion detection system. The experiments have been done on the KDD Cup 99 dataset.

Key-Words / Index Term

IDS, Data mining, KDD Cup, Clustering, Fuzzy, False Positive

References

[1] Shakil Ghalib, Kapil Dewan “Review on Intrusion Detection Approaches with Machine Learning” ©2015,IJARCSSE All Rights Reserved.
[2] Hitesh Chandra Mahawari and Mahesh Pawar , "A Study of Various Methods to find K for K-Means Clustering", International Journal of Computer Sciences and Engineering, Volume-04, Issue-03, Page No (45-47), Mar -2016
[3]. Vidit pathak, Dr. Ananthanarayana V.S. ”A Novel Multi-Threaded K-Means Clustering Approach for Intrsion Detection ”978-1-4673-2008-5/12/$31.00_2012 IEEE.
[4].Li Tian, Wang Jianwen”Research on Network Intrusion Detection System Based on Improved k-means Clustering Algorithm”978-0-7695-3930-0/09 $26.00 _ 2009 IEEE.
[5] Kapil Wankhande, Sadia Patka”An Overview of Intrusion Detection Based on Data Mining Techniques”978-0-7695-4958-3/13 $26.00©2013 IEEE DOI 10.1109/CSNT.2013.134.
[6] Pasquale Foggia, Gennaro Percannella,Carlo Sansone andmario vento,”A Graph-Based Clustering Method and It’s Applications”F.Male et al. (Eds.):BVAI 2007, LNCS 4729, pp.277-287,2007.©Springer.Verlag Berlin Heidelberg 2007.
[7] Zhou mingqiang, Huang Hui, Wang Qian,”A Graph-based Clustering Algorithm for Anomaly Intrusion Detection ”978-1-4673-0242-5/12/$31.00©2012 IEEE.
[8] Hachi fatma, Limam mohamed, ”A two-stage technique to improve intrusion detection system based on data mining algorithms”978-1-4673-5814-9/13/$31.00©2013 IEEE.
[9] Enakshmi Nandi and Debabrata Sarddar, "A Modified MapReduce-K-Means Clustering Based Load Distribution Method for Wireless Sensor Network in Mobile Cloud computing", International Journal of Computer Sciences and Engineering, Volume-04, Issue-08, Page No (107-110), Aug -2016,
[10] Nilam Kolhe, Harshada Kulkarni, Ishita Kedia and Shivani Gaikwad, "Comparative Analysis of Cluster based Boosting", International Journal of Computer Sciences and Engineering, Volume-03, Issue-10, Page No (60-70), Oct -2015
[11] LIU Hai-tao, WEI Ru-xiang and JIANG Guo-ping” Similarity measurement for data with high-dimensional and mixed feature values through fuzzy clustering” in Proceedings of IEEE conference,2012 ,pp-617-621
[12] KddCup-99 Team, The third international knowledge discovery and data mining tools competition, Available from http://kdd.ics.uci.edu/databases/ kddcup99.html, 2002
[13] Dwipen Laskar, Nipjyoti Sarma, A Review On Intrusion Detection SystemUsing Data Mining Techniques,2013, MIT publications, Moradabad , India
[14] Li Tian, Wang Jianwen, 2009 International Forum on Computer Science-Technology and Applications, 978-0-7695-3930-0/09 $26.00 © 2009 IEEE, DOI 10.1109/IFCSTA.2009.25.