The forum in the nation for reporting information security flaws had 14,871 reports by the end of 2021, a 46.6% increase from 2020. The total of 5,567 high risk vulnerabilities, an increase of nearly 1,400 over the previous year. Evidently, both the total number of vulnerabilities found annually, and the total number of high-risk vulnerabilities are rising. In order for data mining technology to play a wider part in the predictive investigation of network security models, it is advised that its capability have to be improved. This paper combines the concepts of data mining (DM) with machine learning (ML), which introduces similar technologies from DM technology and security establishing collection channel, thereby finally introduces the computer network security maintenance process based on data mining in order to improve the application effect of DM in the predictive analysis of network security models. In this paper, a self-organizing neural network technique that detects denial of service (DOS) in complicated networks quickly, effectively, and precisely is introduced. It also analyses a number of frequently employed computer data mining methods, including association, clustering, classification, neural networks, regression, and web data mining. Finally, it introduces a computer data mining method based on the self-organizing (SO) algorithm. In comparison to conventional techniques, the SO algorithm-based computer data mining technology is also used in defensive detection tests against Dos attacks. A detection average accuracy rate of more than 98.56% and a detection average efficiency gain of more than 20% are demonstrated by experimental data to demonstrate that tests based on the Data Mining connected SO algorithm have superior defensive detection effects than standard algorithms.
Keywords
Self-Organizing, Geometric Neighborhood, Regression, NSL‐KDD, Over-Sampling, Under-Sampling and Data Imbalance.
Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: Towards generating reallife datasets for network intrusion detection. IJ Network Security. 17(6),
683–701 (2015)
J. Jang-Jaccard and S. Nepal, “A survey of emerging threats in cybersecurity,” Journal of Computer and System Sciences, vol. 80, no. 5, pp. 973–
993, Aug. 2014, doi: 10.1016/j.jcss.2014.02.005.
Uppal, H.A.M., Javed, M., Arshad, M.: An overview of intrusion detection system (IDS) along with its commonly used techniques and
classifications. Int J Comput Sci Telecommun. 5(2), 20–24 (2014)
N. Sun, J. Zhang, P. Rimba, S. Gao, L. Y. Zhang, and Y. Xiang, “Data-Driven Cybersecurity Incident Prediction: A Survey,” IEEE Communications
Surveys & Tutorials, vol. 21, no. 2, pp. 1744–1772, 2019, doi: 10.1109/comst.2018.2885561.
P. Mishra, V. Varadharajan, U. Tupakula, and E. S. Pilli, “A Detailed Investigation and Analysis of Using Machine Learning Techniques for
Intrusion Detection,” IEEE Communications Surveys & Tutorials, vol. 21, no. 1, pp. 686–728, 2019, doi: 10.1109/comst.2018.2847722.
M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, “A detailed analysis of the KDD CUP 99 data set,” 2009 IEEE Symposium on Computational
Intelligence for Security and Defense Applications, Jul. 2009, doi: 10.1109/cisda.2009.5356528.
R. and P. P., “Deep Learning With Conceptual View in Meta Data for Content Categorization,” Advances in Computational Intelli gence and
Robotics, pp. 176–191, 2021, doi: 10.4018/978-1-7998-2108-3.ch007.
Yin, Y. Zhu, J. Fei, and X. He, “A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks,” IEEE Access, vol. 5, pp.
21954–21961, 2017, doi: 10.1109/access.2017.2762418.
Z. Li, Z. Qin, K. Huang, X. Yang, and S. Ye, “Intrusion Detection Using Convolutional Neural Network s for Representation Learning,” Lecture
Notes in Computer Science, pp. 858–866, 2017, doi: 10.1007/978-3-319-70139-4_87.
J. Yogapriya, C. Saravanabhavan, R. Asokan, Ila. Vennila, P. Preethi, and B. Nithya, “A Study of Image Retrieval System Based on Feature
Extraction, Selection, Classification and Similarity Measurements,” Journal of Medical Imaging and Health Informatics, vol. 8, no. 3, pp. 479–484,
Mar. 2018, doi: 10.1166/jmihi.2018.2326.
Z. Chen, C. K. Yeo, B. S. Lee, and C. T. Lau, “Autoencoder-based network anomaly detection,” 2018 Wireless Telecommunications Symposium
(WTS), Apr. 2018, doi: 10.1109/wts.2018.8363930.
M. Lopez-Martin, B. Carro, A. Sanchez-Esguevillas, and J. Lloret, “Conditional Variational Autoencoder for Prediction and Feature Recovery
Applied to Intrusion Detection in IoT,” Sensors, vol. 17, no. 9, p. 1967, Aug. 2017, doi: 10.3390/s17091967.
Preethi. P and Asokan. R, “Neural Network Oriented RONI Prediction for Embedding Process with Hex Code Encryption in DICOM Images,”
2020 2nd International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), Dec. 2020, doi:
10.1109/icacccn51052.2020.9362880.
G. Caminero, M. Lopez-Martin, and B. Carro, “Adversarial environment reinforcement learning algorithm for intrusion detection,” Computer
Networks, vol. 159, pp. 96–109, Aug. 2019, doi: 10.1016/j.comnet.2019.05.013.
P. Palanisamy, A. Padmanabhan, A. Ramasamy, and S. Subramaniam, “Remote Patient Activity Monitoring System by Integrating IoT Sensors
and Artificial Intelligence Techniques,” Sensors, vol. 23, no. 13, p. 5869, Jun. 2023, doi: 10.3390/s23135869.
KumarShrivas and A. Kumar Dewangan, “An Ensemble Model for Classification of Attacks with Feature Selection based on KDD99 and NSL-
KDD Data Set,” International Journal of Computer Applications, vol. 99, no. 15, pp. 8–13, Aug. 2014, doi: 10.5120/17447-5392.
Y. Zhou, G. Cheng, S. Jiang, and M. Dai, “Building an efficient intrusion detection system based on feature selection and ensemble classifier,”
Computer Networks, vol. 174, p. 107247, Jun. 2020, doi: 10.1016/j.comnet.2020.107247.
P. Preethi and R. Asokan, “An Attempt to Design Improved and Fool Proof Safe Distribution of Personal Healthcare Records for Cloud Computing,”
Mobile Networks and Applications, vol. 24, no. 6, pp. 1755–1762, Oct. 2019, doi: 10.1007/s11036-019-01379-4.
P. D. Shenoy, K. G. Srinivasa, K. R. Venugopal, and L. M. Patnaik, “Dynamic Association Rule Mining using Genetic Algorithms,” Intelligent
Data Analysis, vol. 9, no. 5, pp. 439–453, Nov. 2005, doi: 10.3233/ida-2005-9503.
P. Deepa Shenoy, K. G. Srinivasa, K. R. Venugopal, and L. M. Patnaik, “Evolutionary Approach for Mining Association Rules on Dynamic
Databases,” Lecture Notes in Computer Science, pp. 325–336, 2003, doi: 10.1007/3-540-36175-8_32.
S. J. Rizvi and J. R. Haritsa, “Maintaining Data Privacy in Association Rule Mining,” VLDB ’02: Proceedings of the 28th Inter national Conference
on Very Large Databases, pp. 682–693, 2002, doi: 10.1016/b978-155860869-6/50066-4.
S. M. Darwish, M. M. Madbouly, and M. A. El-Hakeem, “A Database Sanitizing Algorithm for Hiding Sensitive Multi-Level Association Rule
Mining,” International Journal of Computer and Communication Engineering, vol. 3, no. 4, pp. 285–293, 2014, doi: 10.7763/ijcce.2014.v3.337.
J. Vaidya and C. Clifton, “Privacy preserving association rule mining in vertically partitioned data,” Proceedings of the eighth ACM SIGKDD
international conference on Knowledge discovery and data mining, Jul. 2002, doi: 10.1145/775047.775142.
J. Vaidya and C. Clifton, “Secure set intersection cardinality with application to association rule mining,” Journal of Computer Security, vol. 13,
no. 4, pp. 593–622, Oct. 2005, doi: 10.3233/jcs-2005-13401.
M. R. B. Diwate and A. Sahu, “Efficient Data Mining in SAMS through Association Rule,” International Journal of Electronics Communication
and Computer Engineering, vol. 5, no. 3, pp. 593–597, 2014.
Acknowledgements
We would like to thank Reviewers for taking the time and effort necessary to review the manuscript. We sincerely appreciate all valuable comments and suggestions, which helped us to improve the quality of the manuscript.
Funding
No funding was received to assist with the preparation of this manuscript.
Ethics declarations
Conflict of interest
The authors have no conflicts of interest to declare that are relevant to the content of this article.
Availability of data and materials
No data available for above study.
Author information
Contributions
All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.
Corresponding author
Preethi P
Preethi P
Department of Computer Science and Engineering, Kongunadu College of Engineering and Technology, Trichy, India.
Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/
Cite this article
Preethi P, Lalitha K and Yogapriya J, “Self-Organizing Computational System for Network Anomaly Exploration using Learning Algorithms”, Journal of Machine and Computing, vol.3, no.4, pp. 431-445, October 2023. doi: 10.53759/7669/jmc202303035.