A Deviation Based Outlier Intrusion Detection System

With the significant increase in use of networks, network security has become more important and challenging. An intrusion detection system plays a major role in providing security. This paper proposes a model in which Artificial Neural Network and Data Mining approaches are used together. In this m...

Full description

Saved in:
Bibliographic Details
Published inRecent Trends in Network Security and Applications pp. 395 - 401
Main Authors Pareek, Vikas, Mishra, Aditi, Sharma, Arpana, Chauhan, Rashmi, Bansal, Shruti
Format Book Chapter
LanguageEnglish
Published Berlin, Heidelberg Springer Berlin Heidelberg 2010
SeriesCommunications in Computer and Information Science
Subjects
Online AccessGet full text
ISBN9783642144776
3642144772
ISSN1865-0929
1865-0937
DOI10.1007/978-3-642-14478-3_39

Cover

Abstract With the significant increase in use of networks, network security has become more important and challenging. An intrusion detection system plays a major role in providing security. This paper proposes a model in which Artificial Neural Network and Data Mining approaches are used together. In this model “Self Organizing Map” approach is used for behavior learning and “Outlier Mining” approach is used for detecting an intruder. The scope of the proposed model is for internet. This model improves the capability of detecting intruders: both masqueraders and misfeasors.
AbstractList With the significant increase in use of networks, network security has become more important and challenging. An intrusion detection system plays a major role in providing security. This paper proposes a model in which Artificial Neural Network and Data Mining approaches are used together. In this model “Self Organizing Map” approach is used for behavior learning and “Outlier Mining” approach is used for detecting an intruder. The scope of the proposed model is for internet. This model improves the capability of detecting intruders: both masqueraders and misfeasors.
Author Bansal, Shruti
Mishra, Aditi
Sharma, Arpana
Pareek, Vikas
Chauhan, Rashmi
Author_xml – sequence: 1
  givenname: Vikas
  surname: Pareek
  fullname: Pareek, Vikas
  email: er_pareekvikas@yahoo.co.in
  organization: Apaji Institute Of Mathematics and Applied Computer Technology, Banasthali Vidyapith, India
– sequence: 2
  givenname: Aditi
  surname: Mishra
  fullname: Mishra, Aditi
  email: aditimishra29@gmail.com
  organization: Apaji Institute Of Mathematics and Applied Computer Technology, Banasthali Vidyapith, India
– sequence: 3
  givenname: Arpana
  surname: Sharma
  fullname: Sharma, Arpana
  organization: Apaji Institute Of Mathematics and Applied Computer Technology, Banasthali Vidyapith, India
– sequence: 4
  givenname: Rashmi
  surname: Chauhan
  fullname: Chauhan, Rashmi
  email: chauhan.rashmiarya@gmail.com
  organization: Apaji Institute Of Mathematics and Applied Computer Technology, Banasthali Vidyapith, India
– sequence: 5
  givenname: Shruti
  surname: Bansal
  fullname: Bansal, Shruti
  email: shrutib23@gmail.com
  organization: Apaji Institute Of Mathematics and Applied Computer Technology, Banasthali Vidyapith, India
BookMark eNpVkMtOwzAQRQ0UiVLyByzyAwaPH7G9LC2PSpW6oHvLiScoUBIUp0j8PU5ASMxmRueORnPvJZm1XYuEXAO7Acb0rdWGClpITkHKcXbCnpAsYZHgxMQpmYMpFGVW6LN_mi5mfxq3FySL8ZWlUoYZq-ZELvM1fjZ-aLo2v_MRQ747DocG-3zTDv0xjnyNA1bTxvNXHPD9ipzX_hAx--0Lsn-436-e6Hb3uFkttzQCCEtr40vGZeFrwKAFDzJ4U3oeuNK1sMiYBc8ZCAUVpndtVVsOjHOtPAYQC8J_zsaPvmlfsHdl171FB8yNybhk0wmXjLopBTcmI74BrHBR8w
ContentType Book Chapter
Copyright Springer-Verlag Berlin Heidelberg 2010
Copyright_xml – notice: Springer-Verlag Berlin Heidelberg 2010
DOI 10.1007/978-3-642-14478-3_39
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISBN 9783642144783
3642144780
EISSN 1865-0937
Editor Nagamalai, Dhinaharan
Boumerdassi, Selma
Meghanathan, Natarajan
Chaki, Nabendu
Editor_xml – sequence: 1
  givenname: Natarajan
  surname: Meghanathan
  fullname: Meghanathan, Natarajan
  email: natarajan.meghanathan@jsums.edu
– sequence: 2
  givenname: Selma
  surname: Boumerdassi
  fullname: Boumerdassi, Selma
  email: selma.boumerdassi@cedric.fr
– sequence: 3
  givenname: Nabendu
  surname: Chaki
  fullname: Chaki, Nabendu
  email: nabendu@ieee.org
– sequence: 4
  givenname: Dhinaharan
  surname: Nagamalai
  fullname: Nagamalai, Dhinaharan
  email: dhinthia@yahoo.com
EndPage 401
GroupedDBID 29F
ALMA_UNASSIGNED_HOLDINGS
RSU
ID FETCH-LOGICAL-s1139-f8ab0246af1ed732d4da8ba2d257f39e0091a201351ce4219cf92102275aed13
ISBN 9783642144776
3642144772
ISSN 1865-0929
IngestDate Tue Jul 29 20:00:45 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-s1139-f8ab0246af1ed732d4da8ba2d257f39e0091a201351ce4219cf92102275aed13
PageCount 7
ParticipantIDs springer_books_10_1007_978_3_642_14478_3_39
PublicationCentury 2000
PublicationDate 2010
PublicationDateYYYYMMDD 2010-01-01
PublicationDate_xml – year: 2010
  text: 2010
PublicationDecade 2010
PublicationPlace Berlin, Heidelberg
PublicationPlace_xml – name: Berlin, Heidelberg
PublicationSeriesTitle Communications in Computer and Information Science
PublicationSubtitle Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010. Proceedings
PublicationTitle Recent Trends in Network Security and Applications
PublicationYear 2010
Publisher Springer Berlin Heidelberg
Publisher_xml – name: Springer Berlin Heidelberg
SSID ssj0000580895
ssj0000426779
ssib054953581
Score 1.3777802
Snippet With the significant increase in use of networks, network security has become more important and challenging. An intrusion detection system plays a major role...
SourceID springer
SourceType Publisher
StartPage 395
SubjectTerms Artificial Neural Network
Data mining
Internet
Intrusion Detection
Network Security
Title A Deviation Based Outlier Intrusion Detection System
URI http://link.springer.com/10.1007/978-3-642-14478-3_39
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9swDBbS7LL2sK1rse4FHXozPNiR_NAx2zp0wZZesqI3Q7FkxGiXArFz6V_pny0pyba6FgPai2EQQSSRDMlQ5EdCjtUkykom4lBWIg-5YIgBmYkwl4hnDi5QVqbaYp6e_uGzi-RiNLr1qpa27fJLefNoX8lzpAo0kCt2yT5Bsv2XAgHeQb7wBAnD85_g936a1UHEYmFlMBS1zm1Ft0uhtxZYaepdUA_XRRutjRU8ry9lT_5dN6uNTbOquq373IsBtzbkDZiOobJnJbcrd4skm9Xf2te-KVYjWakHX8FRquBs215hZ8vPNbZ5IP27brUdVG5h062BQ-Dl5n7fSmNbE-34CVfA3DdddtbJT1-YKjg_fdGlL4P_oHuZThOO2G6ZnRXjbHWeJmEkXMJE-zSLI-NsMrNTPJ1753bxB57DLxaBxUJcDd4LJnbIDmxgTF5MT2a_zjtjlWBhbocdZ9w-xDqZu_K0wPJ5lJupP_1GsbeoO8jEoj8NB_P6Oh_bxYObehMALV6TPWyKoditAjJ4Q0Z6vU9edTKhTgb7ZNfDt3xL-JT2akCNGlCnBrRXA9qrAbVqcEAWP04W305DN6YjbGL4_xBWuVxCpJfKKtYqYxPFlcyXcqLAG1RMaIjiYwmiZ0lcajitKCthEg1ZIrWK2SEZr6_X-h2haaZ5IpJSRJXmGVMyUhXXXKg0ljpO1BEJOh4U-Ltrig50GzhWsAI4VhiOFcix90_69AfyclDPj2QMTNCfIN5sl5-d5O8A1g90qQ
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Recent+Trends+in+Network+Security+and+Applications&rft.au=Pareek%2C+Vikas&rft.au=Mishra%2C+Aditi&rft.au=Sharma%2C+Arpana&rft.au=Chauhan%2C+Rashmi&rft.atitle=A+Deviation+Based+Outlier+Intrusion+Detection+System&rft.series=Communications+in+Computer+and+Information+Science&rft.date=2010-01-01&rft.pub=Springer+Berlin+Heidelberg&rft.isbn=9783642144776&rft.issn=1865-0929&rft.eissn=1865-0937&rft.spage=395&rft.epage=401&rft_id=info:doi/10.1007%2F978-3-642-14478-3_39
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1865-0929&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1865-0929&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1865-0929&client=summon