COMPARITIVE STUDY OF DATA MINING TECHNIQUES FOR INTRUSION DETECTION SYSTEM
Journal: International Journal of Application or Innovation in Engineering & Management (IJAIEM) (Vol.4, No. 4)Publication Date: 2015-05-14
Authors : Suchi Kumari; Vijay Kumar Jha; Chandrashekhar Azad;
Page : 260-270
Keywords : Data Mining; classification; clustering; association rule;
Abstract
Due to growing information technology day by day,security has remained one challenging area of computer and network.Intrusion detection is the process of analyzing and monitoring the events occurring in network traffic in order to detect suspicious activity.In present study,we provide detailed information about data mining techniques like classification,clustering,association rule, Feature selection, prediction and comparative study of all of the major techniques.This work will also focuson comparative study of all the techniques which comes under classification and clustering in terms of computation,speed and detection rate. It will also present the best algorithm of Intrusion Detection of each type.
Other Latest Articles
- DATA LOGGER MODULE FOR DATA ACQUISTION SYSTEM
- Distributed incomplete pattern matching using unsupervised weighted bloom filter
- GREEN BUILDING MATERIALS ? A Way towards Sustainable Construction
- A REVIEW: AUTOMATIC CAR PARKING DESIGN AND VALIDATION
- Chemical characteristics and macro nutrient status of soils in Meenapur block (Muzaffarpur district) of northern Bihar
Last modified: 2015-05-15 17:35:51