Advertisement

International Journal of Information Technology

, Volume 10, Issue 3, pp 329–337 | Cite as

A novel approach to measure the quality of cluster and finding intrusions using intrusion unearthing and probability clomp algorithm

  • M. Azhagiri
  • A. Rajesh
Original Research

Abstract

Network security is used to monitor and prevent unauthorized access, deployment, enhancement, or contradiction of a network of computers. Network security is a primary issue in processing on the grounds that numerous assortments of assaults are expanding step by step. Despite the fact that, more number of research works were completed in the past for system security yet at the same time there are numerous testing issues. To address the issues in the existing literature, the probability clomp algorithm has been proposed to form the cluster and intrusion unearthing algorithm has been implemented among the clustering environment. The execution of the proposed Intrusion Detection System recognizes the interruption significantly more successfully than the current frameworks. The quality of the cluster is measured with the help of attributes like precision and entropy which is compared with the existing approach. The proposed algorithm is able to achieve high observations and detection to overcome the disadvantages of existing algorithm.

Keywords

Intrusion detection system Network security Clusters KDD Intrusion unearthing algorithm and NSSA 

References

  1. 1.
    Kshirsagar VK, Tidke SM, Vishnu S (2014) Intrusion detection system using genetic algorithm and data mining: an overview. Int J Comput Sci Inform 1(4):2231–5292Google Scholar
  2. 2.
    Ireland E (2014) Intrusion detection with genetic algorithms and fuzzy logic. J Intrusion Netw 3(5):1–10Google Scholar
  3. 3.
    Shanmugavadivu R, Nagarajan N (2015) Network intrusion detection system using fuzzy logic. Indian J Comput Sci Eng (IJCSE) 2(1):101–111Google Scholar
  4. 4.
    Prathibha KS, Kumar P, Shyni TS (2014) Analysis of hybrid intrusion detection system based on data mining techniques. Int J Eng Trends Technol (IJETT) 15(9):447–452Google Scholar
  5. 5.
    Hu W, Gao J, Wang Y, Wu O, Maybank S (2014) Online adaboost-based parameterized methods for dynamic distributed network intrusion detection. IEEE Trans Cybern 44(1):66–82CrossRefGoogle Scholar
  6. 6.
    Wang Y, Fu W, Agrawal DP (2013) Gaussian versus uniform distribution for intrusion detection in wireless sensor networks. IEEE Trans Parallel Distrib Syst 24(2):342–355CrossRefGoogle Scholar
  7. 7.
    Liu G, Wang X (2013) An integrated intrusion detection system by using multiple neural networks. In: Proceedings of CIS IEEE, pp 22–27Google Scholar
  8. 8.
    Fadlullah ZM, Nishiyama H, Kato N, Fouda MM (2013) Intrusion detection system (IDS) for combating attacks against cognitive radio networks. In: International conference on networks, pp 51–56Google Scholar
  9. 9.
    Al-Jarrah O, Arafat A (2014) Network intrusion detection system using attack behavior classification. In: Proceedings of 5th international conference on information and communication systems (ICICS), pp 1–6Google Scholar
  10. 10.
    Senhaji Y, Medromi H, Tallal S (2015) Network security: android intrusion attack on an Arduino network IDS. Int Rev Comput Softw (IRECOS) 10(9):950–958CrossRefGoogle Scholar
  11. 11.
    Idrissi HK, Kartit Z, Kartit A, El Marraki M (2016) CKMSA: an anomaly detection process based on K-means and simulated annealing algorithms. Int Rev Comput Softw (IRECOS) 11(1):42–48CrossRefGoogle Scholar
  12. 12.
    Sarvari S, Muda Z, Ahmad I, Barati M (2015) GA and SVM algorithms for selection of hybrid feature in intrusion detection systems. Int Rev Comput Softw (IRECOS) 10(3):265–270CrossRefGoogle Scholar
  13. 13.
    Elkhadir Z, Chougdali K, Benattou M (2016) Network intrusion detection system using PCA by Lp-norm maximization based on conjugate gradient. Int Rev Comput Softw (IRECOS) 11(1):64–71CrossRefGoogle Scholar

Copyright information

© Bharati Vidyapeeth's Institute of Computer Applications and Management 2018

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringSt. Peter’s UniversityChennaiIndia
  2. 2.Department of Computer Science and EngineeringC. Abdul Hakeem College of Engineering and TechnologyVelloreIndia

Personalised recommendations