an improved network intrusion detection technique based on

12
AN IMPROVED NETWORK INTRUSION DETECTION TECHNIQUE BASED ON K-MEANS CLUSTERING VIA NAIVE BAYES CLASSIFICATION YOUSEF EMAMI [email protected] 06/28/22 Data Mining's Presentation,CE&IT Faculty,Shiraz University of Technology 1

Upload: yousef-emami

Post on 11-Apr-2017

134 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: An improved network intrusion detection technique based on

AN IMPROVED NETWORK INTRUSION DETECTION

TECHNIQUE BASED ON K-MEANS CLUSTERING VIA

NAIVE BAYES CLASSIFICATION

YOUSEF [email protected]

05/03/23 Data Mining's Presentation,CE&IT Faculty,Shiraz University of Technology 1

Page 2: An improved network intrusion detection technique based on

AGENDA

Intrusion Detection

Dataset Description

THE PROPOSED MODEL FOR NIDS

EXPERIMENT AND RESULTS

05/03/23 Data Mining's Presentation,CE&IT Faculty,Shiraz University of Technology 2

Page 3: An improved network intrusion detection technique based on

INTRUSION DETECTION

An Intrusion Detection System (IDS) inspects the activities in a system for suspicious behaviour or patterns that may indicate system attack or misuse.

There are two main categories of intrusion detection techniques;

Anomaly detection Misuse detection

Here ,the performance of K-means clustering and naïve classifier when trained to identify signature of specific attacks is reviewed.

05/03/23 Data Mining's Presentation,CE&IT Faculty,Shiraz University of Technology 3

Page 4: An improved network intrusion detection technique based on

DATASET DESCRIPTION

The utilized data set is KDD Cup which contained a wide variety of intrusions simulated in a military network environment

It consisted of approximately 4,900,000 data instances

The simulated attacks fell in one of the following four categories:

DOS-Denial of Service (e.g. a syn flood), R2L- Unauthorized access from a remote machine (e.g. password

guessing), U2R-Unauthorized access to super user or root functions (e.g. a buffer

overflow attack) Probing-surveillance and other probing for vulnerabilities (e.g. port

scanning).

05/03/23 Data Mining's Presentation,CE&IT Faculty,Shiraz University of Technology 4

Page 5: An improved network intrusion detection technique based on

K-MEANS CLUSTERING VIA NAIVE BAYES CLASSIFICATION MODEL FOR NIDS

05/03/23 Data Mining's Presentation,CE&IT Faculty,Shiraz University of Technology 5

Page 6: An improved network intrusion detection technique based on

Metrics

05/03/23 Data Mining's Presentation,CE&IT Faculty,Shiraz University of Technology 6

Page 7: An improved network intrusion detection technique based on

05/03/23 Data Mining's Presentation,CE&IT Faculty,Shiraz University of Technology 7

Page 8: An improved network intrusion detection technique based on

05/03/23 Data Mining's Presentation,CE&IT Faculty,Shiraz University of Technology 8

Page 9: An improved network intrusion detection technique based on

05/03/23 Data Mining's Presentation,CE&IT Faculty,Shiraz University of Technology 9

Page 10: An improved network intrusion detection technique based on

05/03/23 Data Mining's Presentation,CE&IT Faculty,Shiraz University of Technology 10

Page 11: An improved network intrusion detection technique based on

Thank you for your kind attention

05/03/23 Data Mining's Presentation,CE&IT Faculty,Shiraz University of Technology 11

Page 12: An improved network intrusion detection technique based on

REFERENCE

• Sanjay Kumar Sharmai, Pankaj Pande, Susheel Kumar Tiwari and Mahendra Singh Sisodiai,”An Improved Network Intrusion Detection Technique based on k-Means Clustering via NaIve Bayes Classification”, IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012) March 30, 31, 2012

05/03/23 Data Mining's Presentation,CE&IT Faculty,Shiraz University of Technology 12