ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A critical analysis on intrusion detection techniques

Journal: International Journal of Advanced Technology and Engineering Exploration (IJATEE) (Vol.3, No. 19)

Publication Date:

Authors : ; ; ;

Page : 77-81

Keywords : Intrusion detection; DoS; U2R; R2L and probe.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

An intrusion detection system (IDS) is an application platform that records system fuss for malicious activities and management of these activities. It is a malicious attack identification technique. It allows identifying Denial of service (DoS), User to root (U2R), Remote to login (R2L) and Probe attack. There are several communication mechanism are rely on the networking today so the need of data security is important concern. The main aim of this paper is to focusing on improving attack detection rates. For this we have analyzed the KDD intrusion detection dataset. The main method for approaching this detection and analysis are data mining and optimization techniques for this study.

Last modified: 2016-06-08 16:18:50