DocumentCode :
119753
Title :
Network traffic data to ARFF converter for association rules technique of data mining
Author :
Khamphakdee, Nattawat ; Benjamas, Nunnapus ; Saiyod, Saiyan
Author_Institution :
Dept. of Comput. Sci., Khon Kaen Univ., Khon Kaen, Thailand
fYear :
2014
fDate :
26-28 Oct. 2014
Firstpage :
89
Lastpage :
93
Abstract :
Network traffic data is communication data of user on the network. It is a large data and it also consists of normal and abnormal pattern behavior. The analysis and detection of the abnormal pattern behavior in the network traffic data must spend a long time and very hard to find the intrusion pattern. However, the data mining technology can be utilized to extract normal and abnormal pattern behavior. In addition, an association rules technique is one kind of the data mining technology and it be widely utilized to find a pattern. It can discover the events that frequently occur in these data. In order to find the intrusion pattern, the network traffic data must be converted to the special format for the data mining process. In this paper, we propose the network traffic data to ARFF convertor for the association rules technique of the data mining. We developed the software by using Java language and Weka library. In order to evaluate the performance, we utilized the data set of the MIT-DAPRA 1999 in both week 4th and week 5th. Firstly, we wrote the Snort-IDS rules to detect the data set then record the alert data to mysql database. Secondly, the attributes of the header protocol from snort database will be selected such as tcp, icmp and udp protocol, then save the selected data as .csv file format. Thirdly, the .csv file will be converted to .arff file format by utilizing the Weka library. Finally, we used an apriori algorithm of the association rules mining technique to discover relation of itemsets in the data set. As the experimental result, our application can match the pattern that able to discover the frequent itemsets from the data set then it can generate the association rules which are helpful for computer and network administrator to analyze user behavior. In addition, the attribute of our application can be assigned the number of the attribute in the rule. Thus, the generated rules are able to apply with the intrusion detection syste- .
Keywords :
Java; computer network security; data mining; software libraries; telecommunication traffic; transport protocols; .arff file format; .csv file format; ARFF convertor; Java language; MIT-DAPRA 1999; Snort-IDS rules; Weka library; abnormal pattern behavior; association rules technique; communication data; data mining; header protocol; icmp; intrusion detection system; intrusion pattern; itemsets relation; mysql database; network traffic data; normal pattern behavior; snort database; tcp; udp protocol; Association rules; Conferences; Itemsets; Protocols; Telecommunication traffic; Apriori Algorithm; Association rules; Data mining; Network Security; Network Traffic Data;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Open Systems (ICOS), 2014 IEEE Conference on
Conference_Location :
Subang
Print_ISBN :
978-1-4799-6366-9
Type :
conf
DOI :
10.1109/ICOS.2014.7042635
Filename :
7042635
Link To Document :
بازگشت