
5 CONCLUSION
This research presents a novel method for enhancing
network intrusion alert post-processing by integrating
frequent itemset mining with clustering techniques.
Unlike conventional unsupervised correlation meth-
ods that rely on temporal or similarity-based group-
ing alone, our approach leverages the CHARM algo-
rithm to extract high-confidence attack patterns, fol-
lowed by K-Means clustering to organize alerts based
on behavioural similarity. This dual-stage process re-
duces alert volume, enhances classification accuracy,
and minimizes false positives without requiring la-
belled data. Achieving a 96.2% F1 score and 94.8%
accuracy, the method outperforms DBSCAN and ri-
vals supervised models while remaining more scal-
able and adaptable to evolving threats. A key contri-
bution is demonstrating that meaningful, interpretable
alert grouping can be achieved through pattern-driven
correlation rather than relying solely on density or
distance metrics. This supports real-world analyst
workflows by reducing noise and surfacing actionable
insights. Future work will explore real-time adap-
tation and deep learning-based feature extraction for
improved threat detection.
REFERENCES
Abdulganiyu, O. H., Tchakoucht, T. A., and Saheed, Y. K.
(2023). A systematic literature review for network in-
trusion detection system (ids). International Journal
of Information Security.
Deeks, M. (2023). A review on botnet attacks.
Fontugne, R., Borgnat, P., Abry, P., and Fukuda, K. (2010).
Mawilab. Proceedings of the 6th International COn-
ference on - Co-NEXT ’10.
Fournier-Viger, P. (2008). Spmf: A java open-source data
mining library.
Fournier-Viger, P., Lin, J. C.-W., Vo, B., Chi, T. T., Zhangk,
J., and Le, H. B. (2017). A survey of itemset mining.
Gnatyuk, S., Berdibayev, R., and Aleksander, M. (2023).
Software system for cybersecurity events correlation
and incident management in critical infrastructure. In
Springer Lecture Notes in Computer Science.
Krsteski, S., Tashkovska, M., Sazdov, B., Radojichikj, L.,
Cholakoska, A., and Efnusheva, D. (2023). Intrusion
detection with supervised and unsupervised learning
using pycaret over cicids 2017 dataset. Lecture notes
in networks and systems, pages 125–132.
Leung, K. and Leckie, C. (2005). Unsupervised anomaly
detection in network intrusion detection using clus-
ters. Conferences in Research and Practice in Infor-
mation Technology Series, 38.
May, T. M., Zainudin, Z., Muslim, N., and Jamil, N. S.
(2023). Intrusion detection system (ids) classifications
using hyperparameter tuning for machine learning and
deep learning. IEEE Xplore.
Mburu, A. M. (2023). Integrated security solutions in man-
ufacturing industries and its impact on loss prevention.
IA Journals, 1(4):394–406.
Ram
´
ırez, J. M., D
´
ıez, F., Rojo, P., and Mancuso, V.
(2023). Explainable machine learning for perfor-
mance anomaly detection and classification in mobile
networks. Computer Communications, 200:113–131.
Riyad, A., Ahmed, M., and Almistarihi, H. (2019). A qual-
ity framework to improve ids performance through
alert post-processing. International Journal of Intelli-
gent Engineering and Systems, 12(5):149–160.
Samunnisa, K., Kumar, G. S. V., and Madhavi, K. (2023).
Intrusion detection system in distributed cloud com-
puting: Hybrid clustering and classification methods.
Measurement: Sensors, 25:100612.
Setty, P., Haritha, D., and Rao, V. V. (2012). Improved max-
imal length frequent item set mining. International
Journal of Electronics and Computer Science Engi-
neering.
Sharafaldin, I., Lashkari, A. H., and Ghorbani, A. A.
(2018). Toward generating a new intrusion detection
dataset and intrusion traffic characterization. Proceed-
ings of the 4th International Conference on Informa-
tion Systems Security and Privacy.
Singh, R. R. and Tomar, D. S. (2017). Port scanning attack
analysis with dempster-shafer evidence theory. In-
ternational Journal of Applied Engineering Research,
12(0973-4562):5900–5904.
Spathoulas, G. and Katsikas, S. (2013). Methods for post-
processing of alerts in intrusion detection: A survey.
International Journal of Information Security Science,
2(2):64–80.
Thirimanne, S. P., Jayawardana, L., Yasakethu, L.,
Liyanaarachchi, P., and Hewage, C. (2022). Deep neu-
ral network based real-time intrusion detection sys-
tem. SN Computer Science, 3(2).
Verkerken, M., D’hooge, L., Wauters, T., Volckaert, B., and
Turck, F. D. (2022). Towards model generalization
for intrusion detection: Unsupervised machine learn-
ing techniques. Journal of Network and Systems Man-
agement, 30(1):12.
Yang, Z. (2022). A systematic literature review of meth-
ods and datasets for anomaly-based network intrusion
detection. Computers & Security, 116:102675.
Zaki, M. and Hsiao, C.-J. (2002). Charm: An efficient al-
gorithm for closed itemset mining. In Proceedings of
the Second SIAM International Conference on Data
Mining.
Efficient Post-Processing of Intrusion Detection Alerts Using Data Mining and Clustering
689