THE USE OF DATA MINING IN THE IMPLEMENTATION OF A NETWORK INTRUSION DETECTION SYSTEM

John Sheppard, Joe Carthy, John Dunnion

2005

Abstract

This paper focuses on the domain of Network Intrusion Detection Systems, an area where the goal is to detect security violations by passively monitoring network traffic and raising an alarm when an attack occurs. But the problem is that new attacks are being deployed all the time. This particular system has been developed using a range of data mining techniques so as to automatically be able to classify network tracffic as normal or intrusive. Here we evaluate decision trees and their performance based on a large data set used in the 1999 KDD cup contest.

Download


Paper Citation


in Harvard Style

Sheppard J., Carthy J. and Dunnion J. (2005). THE USE OF DATA MINING IN THE IMPLEMENTATION OF A NETWORK INTRUSION DETECTION SYSTEM . In Proceedings of the First International Conference on Web Information Systems and Technologies - Volume 1: WEBIST, ISBN 972-8865-20-1, pages 399-404. DOI: 10.5220/0001231403990404

in Bibtex Style

@conference{webist05,
author={John Sheppard and Joe Carthy and John Dunnion},
title={THE USE OF DATA MINING IN THE IMPLEMENTATION OF A NETWORK INTRUSION DETECTION SYSTEM},
booktitle={Proceedings of the First International Conference on Web Information Systems and Technologies - Volume 1: WEBIST,},
year={2005},
pages={399-404},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001231403990404},
isbn={972-8865-20-1},
}


in EndNote Style

TY - CONF
JO - Proceedings of the First International Conference on Web Information Systems and Technologies - Volume 1: WEBIST,
TI - THE USE OF DATA MINING IN THE IMPLEMENTATION OF A NETWORK INTRUSION DETECTION SYSTEM
SN - 972-8865-20-1
AU - Sheppard J.
AU - Carthy J.
AU - Dunnion J.
PY - 2005
SP - 399
EP - 404
DO - 10.5220/0001231403990404