Skip to main content

Network Intrusion Detection in an Enterprise: Unsupervised Analytical Methodology

  • Conference paper
  • First Online:
Data Management, Analytics and Innovation

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 808))

Abstract

Be it an individual, or an organization or any government institution, cyber-attack has no boundaries. Cyber-attacks in the form of Malware, Phishing and Intrusion into an enterprise network have become more prevalent these days. With advancement in technology, the number of connected devices has increased vastly leading to storage of very sensitive data belonging to different entities. Cybercriminals attempt to access this data as it is very lucrative for them to monetize this information. Due to the sophistication in technology used by cybercriminals, these attacks have become more difficult to detect and handle, making it a major challenge for governments and various enterprises to protect their sensitive data. Traditional detection methods such as antivirus and firewalls are limited only to known attacks, i.e., the attacks which have occurred in the past. Nowadays the growing advancement in the field of technology has led to unique and different types of attacks for which the traditional detection methods fail. In this paper, we will propose our methodology of Intrusion detection which will be able to handle such threats in near real time.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ratha, N. K., Connell, J. H., & Bolle, R. M. (2001). Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal, 40(3), 614–634.

    Google Scholar 

  2. Goyal, A., & Kumar, C. (2008). GA-NIDS: A genetic algorithm based network intrusion detection system. Northwestern University.

    Google Scholar 

  3. Khan, L., Awad, M., & Thuraisingham, B. (2007). A new intrusion detection system using support vector machines and hierarchical clustering. The VLDB Journal—The International Journal on Very Large Data Bases, 16(4), 507–521.

    Google Scholar 

  4. Ganapathy, S., Yogesh, P., & Kannan, A. (2011). An intelligent intrusion detection system for mobile ad-hoc networks using classification techniques. Communications in Computer and Information Science, 148, 117–122.

    Google Scholar 

  5. Jawhar, M. M. T., & Mehrotra, M. (2010). Anomaly intrusion detection system using hamming network approach. International Journal of Computer Science & Communication, 1(1), 165–169.

    Google Scholar 

  6. Norouzian, M. R., & Merati, S. (2011). Classifying attacks in a network intrusion detection system based on artificial neural networks. In 2011 13th International Conference on Advanced Communication Technology (ICACT). IEEE.

    Google Scholar 

  7. Portnoy, L., Eskin, E, & Stolfo, S. (2001). Intrusion detection with unlabeled data using clustering. In Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA-2001.

    Google Scholar 

  8. Sarasamma, S. T., Zhu, Q. A., & Huff, J. (2005). Hierarchical Kohonenen net for anomaly detection in network security. IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), 35(2), 302–312.

    Google Scholar 

  9. Lappas, T., & Pelechrinis, K. (2007). Data mining techniques for (network) intrusion detection systems. Department of Computer Science and Engineering UC Riverside, Riverside CA, 92521.

    Google Scholar 

  10. Qing, Y., Xiaoping, W., & Gaofeng, H. (2010). An intrusion detection approach based on data mining. In 2010 2nd International Conference on Future Computer and Communication (ICFCC), Vol. 1. IEEE.

    Google Scholar 

  11. Pan, Z.-S. et al. (2003). Hybrid neural network and C4. 5 for misuse detection. In 2003 International Conference on Machine Learning and Cybernetics, Vol. 4. IEEE.

    Google Scholar 

  12. Gaddam, S. R., Phoha, V. V., & Balagani, K. S. (2007). K-Means + ID3: A novel method for supervised anomaly detection by cascading K-Means clustering and ID3 decision tree learning methods. IEEE Transactions on Knowledge and Data Engineering, 19(3), 345–354.

    Google Scholar 

  13. Wang, G. et al. (2010). A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering. Expert Systems with Applications, 37(9), 6225–6232.

    Google Scholar 

  14. Gaikwad, D. P. et al. (2012). Anomaly based intrusion detection system using artificial neural network and fuzzy clustering. International Journal of Engineering, 1(9).

    Google Scholar 

  15. Bahrololum, M., Salahi, E., & Khaleghi, M. (2009). Anomaly intrusion detection design using hybrid of unsupervised and supervised neural network. International Journal of Computer Networks & Communications (IJCNC), 1(2), 26–33.

    Google Scholar 

  16. Muda, Z. et al. (2011). Intrusion detection based on K-Means clustering and Naïve Bayes classification. In 2011 7th International Conference on Information Technology in Asia (CITA 11). IEEE.

    Google Scholar 

  17. Om, H., & Kundu, A. (2012). A hybrid system for reducing the false alarm rate of anomaly intrusion detection system. In 2012 1st International Conference on Recent Advances in Information Technology (RAIT). IEEE.

    Google Scholar 

  18. NETRESEC. (2012). U.S. National CyberWatch Mid-Atlantic Collegiate Cyber Defense Competition (MACCDC) Netresec. http://www.netresec.com/?page=MACCDC.

  19. Yen, T.-F. et al. (2013). Beehive: Large-scale log analysis for detecting suspicious activity in enterprise networks. In Proceedings of the 29th Annual Computer Security Applications Conference. ACM.

    Google Scholar 

  20. Denning, D. E. (1987). An intrusion-detection model. IEEE Transactions on Software Engineering, 2, 222–232.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Garima Makkar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Makkar, G., Jayaraman, M., Sharma, S. (2019). Network Intrusion Detection in an Enterprise: Unsupervised Analytical Methodology. In: Balas, V., Sharma, N., Chakrabarti, A. (eds) Data Management, Analytics and Innovation. Advances in Intelligent Systems and Computing, vol 808. Springer, Singapore. https://doi.org/10.1007/978-981-13-1402-5_34

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-1402-5_34

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-1401-8

  • Online ISBN: 978-981-13-1402-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics