A Survey: Network Intrusion Detection System based on Data Mining Techniques
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.2, No. 10)Publication Date: 2013-10-30
Authors : Subaira.A.S Anitha.P;
Page : 145-153
Keywords : Classification; Data Mining; Intrusion detection system; Anomaly Detection; Misuse Detection;
Abstract
In spite of growing information system widely, security has remained one hard-hitting area for computers as well as networks. In information protection, Intrusion Detection System (IDS) is used to safeguard the data confidentiality, integrity and system availability from various types of attacks. Data mining is an efficient artifice that can be applied to intrusion detection to ascertain a new outline from the massive network data as well as it use to reduce the strain of the manual compilations of the normal and abnormal behaviour patterns. This work reviews the present state of data mining techniques and compares various data mining techniques used to implement an intrusion detection system such as, Support Vector Machine, Genetic Algorithm, Neural network, Fuzzy Logic, Bayesian Classifier, K- Nearest Neighbour and decision tree Algorithms by highlighting the advantages and disadvantages of each of the techniques
Other Latest Articles
- Web Query Classification and URL Ranking Based On Click through Approach?
- Text Document Clustering Using DPM with Concept and Feature Analysis
- A Combined Image Deblurring Using Image Enhancements?
- Analysis of Parsing Techniques & Survey on Compiler Applications?
- APPLICATION OF THE METHOD OF PAIRED COMPARISONS IN CARRYING OUT OF EXAMINATION OF INDUSTRIAL SAFETY AT INDUSTRIAL ENTERPRISES OF THE GRAIN PROCESSING INDUSTRY
Last modified: 2013-10-29 17:31:54