Data Recovery And Intrusion Detection System Using 2SE(2-Seed Expansion)

Authors

  • Jaypal Momale Dept. Computer Engineering, ICEM Indira College of Engineering and Management Pune, India
  • Amarjit Choudhary Dept. Computer Engineering, ICEM Indira College of Engineering and Management Pune, India
  • Pratik Bakshi Dept. Computer Engineering, ICEM Indira College of Engineering and Management Pune, India
  • Aishwarya chavan Dept. Computer Engineering, ICEM Indira College of Engineering and Management Pune, India

Keywords:

malicious network traffic, attack detection, attack phase, network flow clustering.

Abstract

Although many different detection mechanisms have been proposed, exiting detection methods generally tend
to successfully detect attacks only after the attacks have finished and caused damage to the system. As recent attacks
employ polymorphism technology and complicated attack techniques, it has become even more difficult for these
approaches to detect attacks in a timely manner. In this paper, we propose an efficient network attack detection algorithm
called seed expanding (SE) that detects attacks before they damage the system. SE employs the Two-Seed-Expanding
network traffic clustering scheme, which clusters attack traffic into different attack phases. First we pre-process the
networks traffic, including constructing the network flow, changing continuous-valued attributes into nominal attributes
by adopting the discretization method, and further turning into binary features. Then based on these features, SE
computes a weight for each flow and iteratively selects seeds to expand until all flows are divided into clusters. To
investigate the effectiveness of the proposed approach, we undertook extensive experimental analyses. The results of the
experiment show that the pre-procession greatly improves clustering performance, and the Two-Seed-Expanding
Algorithm is better than K-Means and other kinds of Seed-Expanding in attack-flow clustering. These cluster results can
be further used in attack detection.

Published

2017-11-25

How to Cite

Jaypal Momale, Amarjit Choudhary, Pratik Bakshi, & Aishwarya chavan. (2017). Data Recovery And Intrusion Detection System Using 2SE(2-Seed Expansion). International Journal of Advance Research in Engineering, Science & Technology, 4(11), 54–58. Retrieved from https://ijarest.org/index.php/ijarest/article/view/1802