• DocumentCode
    2646429
  • Title

    Reducing network intrusion detection association rules using Chi-Squared pruning technique

  • Author

    Namik, Ammar Fikrat ; Othman, Zulaiha Ali

  • Author_Institution
    Sch. of Comput. Sci., Univ. Kebangsaan Malaysia, Bangi, Malaysia
  • fYear
    2011
  • fDate
    28-29 June 2011
  • Firstpage
    122
  • Lastpage
    127
  • Abstract
    Increasing number of computer networks now a day has increased the effort of putting networks in secure with various attack risk. Intrusion Detection System (IDS) is a popular tool to secure network. Applying data mining has increased the quality of intrusion detection neither as anomaly detection or misused detection from large scale network traffic transaction. Association rules is a popular technique to produce a quality misused detection. However, the weaknesses of association rules is the fact that it often produced with thousands rules which reduce the performance of IDS. This paper aims to show applying post-mining to reduce the number of rules and remaining the most quality rules to produce quality signature. The experiment conducted using two data set collected from KDD Cup 99. Each data set is partitioned into 4 data sets based on type of attacks (PROB, UR2, R2L and DOS). Each partition is mining using Apriori Algorithm, which later performing post-mining using Chi-Squared (χ2) computation techniques. The quality of rules is measured based on Chi-Square value, which calculated according the support, confidence and lift of each association rule. The experiment results shows applying post-mining has reduced the rules up to 98% and remaining the quality rules.
  • Keywords
    computer network security; data mining; digital signatures; telecommunication traffic; DOS attack; KDD Cup 99; PROB attack; R2L attack; UR2 attack; anomaly detection; apriori algorithm; attack risk; chi-squared pruning technique; computer networks; data mining; large scale network traffic transaction; misused detection; network intrusion detection association rules reduction; post-mining; quality signature; Association rules; Databases; Equations; Intrusion detection; Probes; Training; Apriori Algorithm; Association Rules; Chi-Square; Intrusion Detection System;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Data Mining and Optimization (DMO), 2011 3rd Conference on
  • Conference_Location
    Putrajaya
  • ISSN
    2155-6938
  • Print_ISBN
    978-1-61284-211-0
  • Electronic_ISBN
    2155-6938
  • Type

    conf

  • DOI
    10.1109/DMO.2011.5976515
  • Filename
    5976515