Intrusion Detection using unsupervised learning

Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 5

Abstract

Clustering is the one of the efficient datamining techniques for intrusion detection. In clustering algorithm kmean clustering is widely used for intrusion detection. Because it gives efficient results incase of huge datasets. But sometime kmean clustering fails to give best result because of class dominance problem and no class problem. So for removing these problems we are proposing two new algorithms for cluster to class assignment. According to our experimental results the proposed algorithm are having high precision and recall for low class instances.

Authors and Affiliations

Kusum bharti , Sanyam Shukla , Shweta Jain

Keywords

Related Articles

An Efficient Pruning Technique for Mining Frequent Itemsets in Spatial Databases

Frequent Itemset Mining is evaluating the rules and relationship within the data items are optimizing it, in the large spatial databases (for e.g. Images, Docs, AVI files etc).It is one of the major problems in DM (Data...

A Framework for an Ontology-Based Data- Gleaning and Agent Based Intelligent Decision Support PPDM System Employing Generalization Technique for Health Care

The obligatory to anticipate the privacy benefits of heavy ownpour of monsoon rain from the firmament clouds of Privacy Preserving Data Mining (PPDM) Techniques have recently grown leaps and bounds. The desiccated users...

Log Mining Based on Hadoop’s Map and Reduce Technique

In the world of cloud and grid computing Virtual Database Technology (VDB) is one of the effective solutions for integration of data from heterogeneous sources. Hadoop is a large-scale distributed batch processing infras...

OPTIMIZATION OF LOW POWER USING FIR FILTER

In this paper we proposed a three stage pipelined finite-impulse response (FIR) filter, this FIR filter contains multipliers such as Hybrid multiplier, Booth multiplier algorithm and Array multiplier. In general, multipl...

Performance Comparison of Common Table Expressions and Cursors

This paper compares the performance of common table expressions and cursors when implemented for complex queries. Cursor enables traversal of records in a database. Cursors can also be called as “Iterators”, as it perfor...

Download PDF file
  • EP ID EP144993
  • DOI -
  • Views 115
  • Downloads 0

How To Cite

Kusum bharti, Sanyam Shukla, Shweta Jain (2010). Intrusion Detection using unsupervised learning. International Journal on Computer Science and Engineering, 2(5), 1865-1870. https://europub.co.uk./articles/-A-144993