SlideShare a Scribd company logo
By
    Shishir Shandilya(0610101041)
    Rajesh Ghildiyal(06180101036)
Balbeer Singh Rawat(06180101006)
             Under the Guidance of
                    MR. Ajit Singh
Problem Definition
 An Intrusion Detection System is an
  important part of the Security
  Management system for computers and
  networks that tries to detect break-ins or
  break-in attempts.
 Approaches to Solution
     Signature-Based
     Anomaly Based.
Types of Intrusion Detection
   Classification I
     Real Time
     After-the-fact (offline)
   Classification II
     Host Based
     Network Based
Approaches to IDS
Technique   Signature Based         Anomaly Based
Concept      Model well-known      Model is based on normal behavior of the
            attacks                 system
             use these known       Try to flag the deviation from normal
            patterns to identify    pattern as intrusion
            intrusion.
Pros and     Specific to attacks    Usual changes due to traffic etc may lead
Cons        can not extend to       higher number of false alarms .
            unknown intrusion
            patterns( False
            Negatives)
Approaches for IDS
Network-Based              Host-Based

•Are installed on N/W     •Are installed locally on
Switches                  host machines
•Detect some of the
attacks, that host-based
systems don’t. E.g.. DOS,
Fragmented Packets.
Recommended Approach
 None provides a complete solution
 A hybrid approach using HIDS on local
  machines as well as powerful NIDS on
  switches
Attack Simulation
   Types of attacks
     NIDS
      ○ SYN-Flood Attack
     HIDS
      ○ ssh Daemon attack.
NIDS – Data Preprocessing
   Input data
     tcpdump trace.
     Huge
     One data record per packet
   Features extracted(Using Perl Scripts)
     Content-Based
       Group records and construct new features
      corresponding to single connection
     Time-Based
       Adding time-window based information to the
      connection records (Param: Time-window)
     Connection-Based
       Adding connection-window based information
      (Param: Time-window)
Preprocessing on tcpdump
   From the tcpdump data we extracted
    following fields
       src_ip ,dst_ip
       src_port, dst_port
       num_packets_src_dest / num_packets_dest_src
       num_ack_src_dst/ num_ack_dst_src
       num_bytes_src_dst/ num_bytes_dst_src
       num_retransmit_src_dst/ num_retransmit_dst_src
       num_pushed_src_dst/ num_pushed_dst_src
       num_syn_src_dst/ num_syn_dst_src
       num_fin_src_dst/ num_fin_dst_src
       connection status
Preprocessing on tcpdump
               cont…
   Time-Window Based Features
     Count_src/count_dst
     Count_serv_src/ count_serv_dest


   Connection-Window Based
     Count_src1 /count_dst1
     Count_serv_src1/ count_serv_dest1
NIDS- Datamining
Technique
   Outlier Detection
     Clustering Based Approach(K-Means)
      ○ Outlier Threshold
      ○ Preprocessed dataset
     K-NN Based Approach
      ○ distance threshold
      ○ Preprocessed dataset
   Results
     Clustering did not give good results.
      ○ Limited Data
     K-NN
      ○ Giving Alarms
HIDS – Data Preprocesing
   Input data
     “strace” system call logs for a particular
      process(sshd)
     One data record per system call
     Sliding-Window Size for grouping.
   Features extracted(Using Perl Scripts)
     Sliding the window over the trace to
      generate possible sequences of system
      calls.
HIDS – Data Preprocessing
cont…
a d f g a e d a e b s d e a

ad f g
d f g a
f g a e
g a e d
a e d a
e d a e
d a e b
a e b s
e b s d
b s d e
s d e a
Datamining Technique Used
   Learning to predict system calls
     Predict ith system call for each test record<p1,
      p2,p3>
     Done using Classification (Decision Trees)


   Anomaly Detection
     Use of misclassification score to detect
      anomalies
Literature Survey
 Types of attacks (Host and Network
  Based)
 Techniques
     Association rules and Frequent Episode
      Rules over host based and network based
     Outlier Detection using clustering
     classification
Future Work
   NIDS
     To incorporate threshold distance as a
     configurable parameter for K-Means
     Algorithm used
   HIDS
     Try out meta-learning algorithms for
     classification
   A small user Interface for configuring
    parameters.
References
   “Mining in a data-flow Environment: Experience in
    Network Intrusion Detection”, W. Lee, S. Stolfo, K. Mok.
   “Mining audit data to build intrusion detection models”,
    W. Lee, S. Stolfo, K. Mok.
   “Data Mining approaches for Intrusion Detection”, W.
    Lee S. Stolfo.
   “A comparative study of anomaly detection schemes in
    network intrusion detection”, A. Lazarevic, A ozgur, L.
    Ertoz, J. Srivastava, Vipin Kumar.
   “Anomaly Intrusion detection by internet datamining pf
    traffic episodes” Min Qin & Kai Gwang.
   “A database of computer attacks for the evaluation of
    Intrusion Detection System”, Thesis by Kristopher
    Kendall.

More Related Content

PPT
Intrusion Detection Techniques for Mobile Wireless Networks
PPTX
Introduction to WDM and TDM
PPTX
Intrusion Prevention System
PPT
Intrusion .ppt
PPTX
Network traffic analysis with cyber security
PDF
Call Setup
PPTX
Adhoc wireless networks and its issues
PDF
Routing in Mobile Ad hoc Networks
Intrusion Detection Techniques for Mobile Wireless Networks
Introduction to WDM and TDM
Intrusion Prevention System
Intrusion .ppt
Network traffic analysis with cyber security
Call Setup
Adhoc wireless networks and its issues
Routing in Mobile Ad hoc Networks

What's hot (20)

PPTX
Lecture 10 intruders
PPTX
Wsn state-centric programming
PPTX
Dos n d dos
PDF
Location Aided Routing (LAR)
PPSX
Adhoc and routing protocols
PPTX
PDF
Computer network
PPTX
Olsr protocol ppt
PPT
PDF
Wireless Sensor Networks UNIT-1
PDF
05. Frequency Management and Channel Assignment.pdf
PDF
Mobile Communications Sajay K R
PPTX
Big data Analytics(BAD601) -module-1 ppt
PDF
IT8602 Mobile Communication - Unit V
PPTX
Presentation on modem
PPTX
Deep learning approach for network intrusion detection system
PPTX
Unit -1 Circuit Switch and Data gram Switch
PPTX
Gsm architecture
Lecture 10 intruders
Wsn state-centric programming
Dos n d dos
Location Aided Routing (LAR)
Adhoc and routing protocols
Computer network
Olsr protocol ppt
Wireless Sensor Networks UNIT-1
05. Frequency Management and Channel Assignment.pdf
Mobile Communications Sajay K R
Big data Analytics(BAD601) -module-1 ppt
IT8602 Mobile Communication - Unit V
Presentation on modem
Deep learning approach for network intrusion detection system
Unit -1 Circuit Switch and Data gram Switch
Gsm architecture
Ad

Viewers also liked (20)

PPT
Data Mining and Intrusion Detection
PPTX
Databse Intrusion Detection Using Data Mining Approach
PPT
Intrusion detection system ppt
PDF
A Study on Data Mining Based Intrusion Detection System
PPTX
Analysis and Design for Intrusion Detection System Based on Data Mining
PPTX
Educational Data Mining/Learning Analytics issue brief overview
PPTX
powerpoint feb
PDF
∂u∂u Multi-Tenanted Framework: Distributed Near Duplicate Detection for Big Data
PPSX
Adaptive Intrusion Detection Using Learning Classifiers
PDF
ViTeNA: An SDN-Based Virtual Network Embedding Algorithm for Multi-Tenant Dat...
PPTX
DM for IDS
PPTX
machine learning in the age of big data: new approaches and business applicat...
PPTX
Ids presentation
PDF
2015 01-17 Lambda Architecture with Apache Spark, NextML Conference
PDF
Using Machine Learning in Networks Intrusion Detection Systems
PPT
Intrusion Detection
PDF
Efficient Duplicate Detection Over Massive Data Sets
PPTX
Data mining to predict academic performance.
PPTX
02 Related Concepts
PDF
Advances in Learning Analytics and Educational Data Mining
Data Mining and Intrusion Detection
Databse Intrusion Detection Using Data Mining Approach
Intrusion detection system ppt
A Study on Data Mining Based Intrusion Detection System
Analysis and Design for Intrusion Detection System Based on Data Mining
Educational Data Mining/Learning Analytics issue brief overview
powerpoint feb
∂u∂u Multi-Tenanted Framework: Distributed Near Duplicate Detection for Big Data
Adaptive Intrusion Detection Using Learning Classifiers
ViTeNA: An SDN-Based Virtual Network Embedding Algorithm for Multi-Tenant Dat...
DM for IDS
machine learning in the age of big data: new approaches and business applicat...
Ids presentation
2015 01-17 Lambda Architecture with Apache Spark, NextML Conference
Using Machine Learning in Networks Intrusion Detection Systems
Intrusion Detection
Efficient Duplicate Detection Over Massive Data Sets
Data mining to predict academic performance.
02 Related Concepts
Advances in Learning Analytics and Educational Data Mining
Ad

Similar to Intrusion detection using data mining (20)

PPTX
Intrusion Detection Systems Pedagogy.pptx
PDF
C3602021025
PDF
International Journal of Engineering Research and Development (IJERD)
PDF
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
PDF
Bt33430435
PDF
Bt33430435
PDF
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
PDF
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
PDF
Vol 6 No 1 - October 2013
PDF
Review of Intrusion and Anomaly Detection Techniques
PDF
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
PDF
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
PDF
Intrusion detection system: classification, techniques and datasets to implement
PDF
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
PPTX
Role of data mining in cyber security
PDF
A Study on Data Mining Based Intrusion Detection System
PDF
Survey on Host and Network Based Intrusion Detection System
PDF
Network Intrusion Detection System Based on Modified Random Forest Classifier...
PDF
Survey of network anomaly detection using markov chain
PDF
International Journal of Computer Science, Engineering and Information Techno...
Intrusion Detection Systems Pedagogy.pptx
C3602021025
International Journal of Engineering Research and Development (IJERD)
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
Bt33430435
Bt33430435
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
Vol 6 No 1 - October 2013
Review of Intrusion and Anomaly Detection Techniques
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
Intrusion detection system: classification, techniques and datasets to implement
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
Role of data mining in cyber security
A Study on Data Mining Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection System
Network Intrusion Detection System Based on Modified Random Forest Classifier...
Survey of network anomaly detection using markov chain
International Journal of Computer Science, Engineering and Information Techno...

Recently uploaded (20)

PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
Insiders guide to clinical Medicine.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
RMMM.pdf make it easy to upload and study
PDF
Computing-Curriculum for Schools in Ghana
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Institutional Correction lecture only . . .
PPTX
Cell Structure & Organelles in detailed.
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Complications of Minimal Access Surgery at WLH
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
master seminar digital applications in india
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Insiders guide to clinical Medicine.pdf
human mycosis Human fungal infections are called human mycosis..pptx
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
O7-L3 Supply Chain Operations - ICLT Program
RMMM.pdf make it easy to upload and study
Computing-Curriculum for Schools in Ghana
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Institutional Correction lecture only . . .
Cell Structure & Organelles in detailed.
TR - Agricultural Crops Production NC III.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Module 4: Burden of Disease Tutorial Slides S2 2025
Complications of Minimal Access Surgery at WLH
2.FourierTransform-ShortQuestionswithAnswers.pdf
master seminar digital applications in india
O5-L3 Freight Transport Ops (International) V1.pdf

Intrusion detection using data mining

  • 1. By Shishir Shandilya(0610101041) Rajesh Ghildiyal(06180101036) Balbeer Singh Rawat(06180101006) Under the Guidance of MR. Ajit Singh
  • 2. Problem Definition  An Intrusion Detection System is an important part of the Security Management system for computers and networks that tries to detect break-ins or break-in attempts.  Approaches to Solution  Signature-Based  Anomaly Based.
  • 3. Types of Intrusion Detection  Classification I  Real Time  After-the-fact (offline)  Classification II  Host Based  Network Based
  • 4. Approaches to IDS Technique Signature Based Anomaly Based Concept  Model well-known Model is based on normal behavior of the attacks system  use these known Try to flag the deviation from normal patterns to identify pattern as intrusion intrusion. Pros and  Specific to attacks  Usual changes due to traffic etc may lead Cons can not extend to higher number of false alarms . unknown intrusion patterns( False Negatives)
  • 5. Approaches for IDS Network-Based Host-Based •Are installed on N/W •Are installed locally on Switches host machines •Detect some of the attacks, that host-based systems don’t. E.g.. DOS, Fragmented Packets.
  • 6. Recommended Approach  None provides a complete solution  A hybrid approach using HIDS on local machines as well as powerful NIDS on switches
  • 7. Attack Simulation  Types of attacks  NIDS ○ SYN-Flood Attack  HIDS ○ ssh Daemon attack.
  • 8. NIDS – Data Preprocessing  Input data  tcpdump trace.  Huge  One data record per packet  Features extracted(Using Perl Scripts)  Content-Based Group records and construct new features corresponding to single connection  Time-Based Adding time-window based information to the connection records (Param: Time-window)  Connection-Based Adding connection-window based information (Param: Time-window)
  • 9. Preprocessing on tcpdump  From the tcpdump data we extracted following fields  src_ip ,dst_ip  src_port, dst_port  num_packets_src_dest / num_packets_dest_src  num_ack_src_dst/ num_ack_dst_src  num_bytes_src_dst/ num_bytes_dst_src  num_retransmit_src_dst/ num_retransmit_dst_src  num_pushed_src_dst/ num_pushed_dst_src  num_syn_src_dst/ num_syn_dst_src  num_fin_src_dst/ num_fin_dst_src  connection status
  • 10. Preprocessing on tcpdump cont…  Time-Window Based Features  Count_src/count_dst  Count_serv_src/ count_serv_dest  Connection-Window Based  Count_src1 /count_dst1  Count_serv_src1/ count_serv_dest1
  • 11. NIDS- Datamining Technique  Outlier Detection  Clustering Based Approach(K-Means) ○ Outlier Threshold ○ Preprocessed dataset  K-NN Based Approach ○ distance threshold ○ Preprocessed dataset  Results  Clustering did not give good results. ○ Limited Data  K-NN ○ Giving Alarms
  • 12. HIDS – Data Preprocesing  Input data  “strace” system call logs for a particular process(sshd)  One data record per system call  Sliding-Window Size for grouping.  Features extracted(Using Perl Scripts)  Sliding the window over the trace to generate possible sequences of system calls.
  • 13. HIDS – Data Preprocessing cont… a d f g a e d a e b s d e a ad f g d f g a f g a e g a e d a e d a e d a e d a e b a e b s e b s d b s d e s d e a
  • 14. Datamining Technique Used  Learning to predict system calls  Predict ith system call for each test record<p1, p2,p3>  Done using Classification (Decision Trees)  Anomaly Detection  Use of misclassification score to detect anomalies
  • 15. Literature Survey  Types of attacks (Host and Network Based)  Techniques  Association rules and Frequent Episode Rules over host based and network based  Outlier Detection using clustering  classification
  • 16. Future Work  NIDS  To incorporate threshold distance as a configurable parameter for K-Means Algorithm used  HIDS  Try out meta-learning algorithms for classification  A small user Interface for configuring parameters.
  • 17. References  “Mining in a data-flow Environment: Experience in Network Intrusion Detection”, W. Lee, S. Stolfo, K. Mok.  “Mining audit data to build intrusion detection models”, W. Lee, S. Stolfo, K. Mok.  “Data Mining approaches for Intrusion Detection”, W. Lee S. Stolfo.  “A comparative study of anomaly detection schemes in network intrusion detection”, A. Lazarevic, A ozgur, L. Ertoz, J. Srivastava, Vipin Kumar.  “Anomaly Intrusion detection by internet datamining pf traffic episodes” Min Qin & Kai Gwang.  “A database of computer attacks for the evaluation of Intrusion Detection System”, Thesis by Kristopher Kendall.