Implementation of CM-SPADE Algorithm In Building Denial of Service Detection System Model Using Snort

2Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.

Abstract

Along with the increasing use of computers, business activities and data storage also use it. The increasing importance of the computer raises challenges and risks, especially in security of the computer system and network. Various ways have been done to improve computer network security, one of which is using the Intrusion Detection System (IDS). To maximize the IDS detection function that is able to detect unknown attacks, a data mining approach is used to create an IDS that uses anomaly-based detection techniques. In this study, a sequential pattern mining technique, the CM-SPADE algorithm, is used to generate IDS rules that can detect DoS attacks. Modeling and rules are made by applying the CM-SPADE algorithm to the KDD Cup 1999 data set. The results reveal that the implementation of the CM-SPADE algorithm is able to produce IDS rules that can detect DoS attacks with an accuracy rate of 97.976%.

Cite

CITATION STYLE

APA

Nugroho, E. P., Megasari, R., Junaeti, E., & Pribadi, S. R. (2020). Implementation of CM-SPADE Algorithm In Building Denial of Service Detection System Model Using Snort. In Proceedings of the 7th Mathematics, Science, and Computer Science Education International Seminar, MSCEIS 2019. European Alliance for Innovation. https://doi.org/10.4108/eai.12-10-2019.2296332

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free