A New Data Mining Based Network Intrusion Detection Model
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Active In SP

Posts: 1
Joined: Feb 2011
02-02-2011, 07:09 AM

Hello sir, I am prem,am persuing BTECH 4th year .I want to get details of a seminor topic name "A New Data Mining Based Network Intrusion Detection Model" please help me to get any details about this topic.i want to give my seminor topic tommarow only so please help me as fast as possible
seminar paper
Active In SP

Posts: 6,455
Joined: Feb 2012
15-02-2012, 11:39 AM

to get information about the topic A New Data Mining Based Network Intrusion Detection Model full report ,ppt and related topic refer the link bellow

http://topicideas.org/how-to-intrusion-d...ds-seminar and presentation-report

http://seminar and presentationproject and implimentations.com/attachment.php?aid=129
seminar flower
Super Moderator

Posts: 10,120
Joined: Apr 2012
22-09-2012, 01:39 PM

A New Data-Mining Based Approach for Network Intrusion Detection

.pdf   1A New Data-Mining.pdf (Size: 709.61 KB / Downloads: 37)


Nowadays, as information systems are more open to
the Internet, the importance of secure networks is
tremendously increased. New intelligent Intrusion Detection
Systems (IDSs) which are based on sophisticated algorithms
rather than current signature-base detections are in demand.
In this paper, we propose a new data-mining based technique
for intrusion detection using an ensemble of binary classifiers
with feature selection and multiboosting simultaneously. Our
model employs feature selection so that the binary classifier for
each type of attack can be more accurate, which improves the
detection of attacks that occur less frequently in the training
data. Based on the accurate binary classifiers, our model
applies a new ensemble approach which aggregates each
binary classifier’s decisions for the same input and decides
which class is most suitable for a given input. During this
process, the potential bias of certain binary classifier could be
alleviated by other binary classifiers’ decision. Our model also
makes use of multiboosting for reducing both variance and


There has been a recent awareness of the risk associated
with network attacks by criminals or terrorists, as
information systems are now more open to the Internet than
ever before. Records made available by the Pentagon showed
that they logged over 79,000 attempted intrusions in 2005
with about 1,300 successful ones. The deployment of
sophisticated firewalls or authentication systems is no longer
enough for building a secure information system. In addition,
most of intrusion detection systems nowadays rely on
handcrafted signatures just like anti-viruses which have to be
updated continuously in order to be effective against new
attacks. There is a need now to focus on the detection of
unknown intrusions instead of relying on this signaturebased
approach. This has led to another approach to intrusion
detection which consists of detecting anomalies on the
network. The anomaly detection attempts to quantify usual
or acceptable behavior and flags other irregular behavior as
potentially intrusive [1].


There have been several research works on how
Knowledge Development and Data mining (KDD) task can
help improve Intrusion Detection Systems (IDSs):
classification, sequential analysis, time series analysis,
prediction, clustering, and association rules [1][3][4][5][6].
In addition, previous works on the KDD cup ’99 dataset
[7][8], which is the dataset we are going to use for our
experiments, have used various data mining techniques, e.g.,
by varying classification algorithm, focusing on feature
selection, and even combining techniques.

Feature Selection

Feature selection can be considered an important asset in
building classification models as some data may hinder the
classification process in a complex domain. Moreover
elimination of useless features enhances the accuracy of
detection while speeding up the computation. Thus, feature
selection improves the overall performance of the detection
A few data mining techniques have used feature selection
techniques. The simplest approach consists of removing one
feature at a time and testing the performance of a
classification algorithm against the removed features. This
approach was used by Mukkamala and Sung [9] and was
tested with two different classification algorithms: Support
Vector Machines (SVMs) and Artificial Neural Networks
(NNs). Another more efficient approach to feature selection
is proposed by Chebrolu, Abraham, and Thomas [10]. The
authors proposed two different approaches: Bayesian
networks and Classification and Regression Trees (CARTs)


The effect of combining different classifiers can be
explained with the theory of bias-variance decomposition.
Bias refers to an error due to a learning algorithm while
variance refers to an error due to the learned model. The total
expected error of a classifier is the sum of the bias and the
variance. In order to reduce bias and variation, some
ensemble approaches have been introduced: Adaptive
Boosting (AdaBoost) [11], Bootstrap Aggregating (Bagging)
[12], Wagging [13][14], and Multiboosting [15].

Utilizing Feature Selection and Multiboosting

In our model, we aim to increase overall detection
accuracy as well as decrease the bias and variance, by
leveraging an ensemble of individual binary classifiers with
feature selection and the multiboosting simultaneously.
First, we generate a binary classifier for each type of
event by applying different features for different classes to
generate more accurate results. The effectiveness of feature
selection for binary classifiers has been shown in the
experiments of Chebrolu, Abraham, and Thomas [10]. We
also found that feature selection is useful in detecting lowfrequency
instances like U2R and R2L in our experiments.
Thus, it has helped to increase the overall accuracy of our


In this paper, we propose a new data-mining based
approach by combining multiboosting and an ensemble of
binary classifiers with feature selection using either the
information gain or the gain ratio criterion.
This approach consists of three major functions: 1)
generation of accurate binary classifiers by applying
different features for different types of attacks, 2) a new
ensemble approach of the binary classifiers for removing
bias, 3) applying multiboosting for reducing both bias and
variance. This model performs well and we even obtain
93.8128% detection rate using the gain ratio criterion as well
as high detection rates for U2R and R2L compared to other
works. The proposed system performs better than the
winning entry of the KDD cup in term of accuracy and cost.

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: data mining topic name, data mining and intrusion detection seminar report, seminar base papers for data mining on network intrusion system, special topic seminar on intrusion detection using data mining techniques, intrusion detection system based on data mining ppt, any new topic in data mining in networking, data mining based intrusion detection seminar report,
Popular Searches: naalukette top new model, new rimmel model, intrusion detection system using data mining ppt, anand babu nb, network based intrusion detection system, network based intrusion detection system algorithms, new ideas data mining,

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
Wink free donload source ranking model adaptation for domain specific search in java Guest 1 52 12-10-2016, 09:12 AM
Last Post: amrutha735
  free download howrah bridge 3d model Guest 1 89 11-10-2016, 03:13 PM
Last Post: amrutha735
  online voting system data flow diagram level0 level1 level2 free download Guest 1 59 11-10-2016, 02:44 PM
Last Post: amrutha735
  matlab project breast cancer detection code free download Guest 1 53 11-10-2016, 12:57 PM
Last Post: amrutha735
  network theory by a v bakshi u a bakshi pdf download Guest 1 44 11-10-2016, 11:59 AM
Last Post: amrutha735
  indian fake currency detection using matlab code Guest 1 69 11-10-2016, 11:57 AM
Last Post: amrutha735
  seminar report on artificial neural network pdf Guest 1 62 11-10-2016, 10:27 AM
Last Post: amrutha735
  data leakage detection using cloud computing ppt Guest 1 31 11-10-2016, 09:10 AM
Last Post: amrutha735
  a novel image data hiding scheme with diamond encoding ppt Guest 1 44 08-10-2016, 04:44 PM
Last Post: amrutha735
  ppt new techniques of erosion control on hill road with abstract pdf Guest 1 95 08-10-2016, 04:25 PM
Last Post: amrutha735