Copyright © 2018 V. Mala, K. Meena. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. International Journal of Engineering & Technology, 7 (2.4) (2018) 10-13 International Journal of Engineering & Technology Website: www.sciencepubco.com/index.php/IJET Research Paper Hybrid classification model to detect advanced intrusions using data mining techniques V. Mala 1 *, K. Meena 2 1 Research Scholar, Veltech Rangarajan Dr. Sagunthala R&D Institute Science & Technology, Chennai 2 Associate Professor, Department of Computer Science & Engineering, Veltech Rangarajan Dr. Sagunthala R&D Institute Science & Technology, Chennai *Corresponding author E-mail: malarajinikanth10@gmail.com Abstract Traditional signature based approach fails in detecting advanced malwares like stuxnet, flame, duqu etc. Signature based comparison and correlation are not up to the mark in detecting such attacks. Hence, there is crucial to detect these kinds of attacks as early as possible. In this research, a novel data mining based approach were applied to detect such attacks. The main innovation lies on Misuse signature de- tection systems based on supervised learning algorithm. In learning phase, labeled examples of network packets systems calls are (gave) provided, on or after which algorithm can learn about the attack which is fast and reliable to known. In order to detect advanced attacks, unsupervised learning methodologies were employed to detect the presence of zero day/ new attacks. The main objective is to review, different intruder detection methods. To study the role of Data Mining techniques used in intruder detection system. Hybrid classification model is utilized to detect advanced attacks. Keywords: Data Mining; Hybrid; Stuxnet; Flame; Duqu; Unsupervised Learning. 1. Introduction Intrusion is defined as an action set done to accommodate goals relating security, like reliability, privacy, or accessibility. The resource of networking and computing are checked for the intru- sion. Detection of intrusion is the process of diagnosing and ac- knowledging to intrusion activities. IDS were first introduced by James Anderson in the year 1980[1]. Detection of intrusion meth- ods is followed for several years to ensure security in the system. Using intrusion detection methods, one can gather and use facts from known types of attacks and discover if someone wants to attack your network or a particular host. The information gathered are being used in improving network safety, as well as for author- ized functions. Both economic and open source products are made available for this cause. Many susceptibility estimation tools are also made available in the market which is used in fixing various kinds of security holes available in a network. Hybrid categoriza- tion model is used to detect advanced intrusions using data mining techniques. The technique is calculated with a captured real-time flow and a dataset of packets, a scattered disapproval of service dataset, and the intrusion of benchmark dataset called the discov- ery of knowledge and mining of data. 2. Literature review Detection of network anomaly by Cascading K-Means Clustering and C4.5 Decision Tree algorithm [7] was used by many research- ers in the past years. It was useful to detect intruder in High accu- racy rate, Drawback of this approach is cannot processing large dataset. Efficient accession toward Intrusion Detection System using the technique of data mining [2] used Hybrid PSO with C4.5, SNORT with ALADLERAD, SVM and HOPERAA ap- proaches to detect Intruders. Advantage of this approach is the detection of the intruder in high accuracy rate. Drawback of this approach it cannot be applied to real traffic. A design of hybrid intrusion detection system for computer network safety [8] men- tioned in this paper focus on the hybrid IDS is achieved by consol- idating anomaly detection of packet header and network traffic. The advantage of this approach is Detect more attacks than SNORT, Draw back cannot detect behavioral attacks. Hybrid ac- cess for Anomaly Network Traffic Detection using the technique of Data Mining[9]mentioned in this paper focus on hybrid IDS is the combing the method Entropy and SVM classifier .Advantage of this approach is network properties is clearly defined , Disad- vantage is it cannot process large data.