Filters








18,863 Hits in 5.3 sec

A Survey on Data Mining Approaches for Network Intrusion Detection System

Anirudha A., Mangesh G., Ritesh V.
2017 International Journal of Computer Applications  
Network intrusion detection is the process of monitoring the events occurring in a computing system or network and analysing them for signs of intrusions.  ...  In this paper, intrusion detection & several areas of intrusion detection in which data mining technology applied are discussed.  ...  Other data mining methods for finding evolving clusters and building dynamic classification models in data streams are also necessary for real-time intrusion detection.  ... 
doi:10.5120/ijca2017912615 fatcat:2qtbbqz7ajdhvixfk6j77e76zq

Adversarial Data Mining

Murat Kantarcioglu, Bowei Xi
2016 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16  
Hence, data mining techniques are becoming an essential tool for real-world cyber security applications. For example, a report from Gartner [4] claims that "Information security  ...  As more and more cyber security incident data ranging from systems logs to vulnerability scan results are collected, manually analyzing these collected data to detect important cyber security events become  ...  Adversarial data mining techniques provide an alternative approach for intrusion detection.  ... 
doi:10.1145/2976749.2976753 dblp:conf/ccs/KantarciogluX16 fatcat:n2hfosfgqffg5pg5ggroc4ydau

Intrusion Detection System Using Data Mining Techniques– A Review

Ranju Marwaha
2017 International Journal of Advanced Research in Computer Science and Software Engineering  
Data Mining based IDS can provide more accuracy of results and these results can be used in automated Decision Support System or by Analyst. This will focus on role of Data Mining Techniques in IDS.  ...  Intrusion Detection System tools aim to detect computer attacks, computer misuse and to alert the proper individuals upon detection. But still they face challenges in robust and changing environment.  ...  By using Data mining techniques, IDS helps to detect abnormal and normal patterns. The various data mining techniques that are used in the context of intrusion detection. 1.  ... 
doi:10.23956/ijarcsse/v7i5/0161 fatcat:5vc2xvzmhrcjfpi52skakaq32u

HIGH PERFORMANCE INTRUSION DETECTION USING MODIFIED K-MEAN AND NAIVE BAYES

Anupam Sakhi .
2016 International Journal of Research in Engineering and Technology  
In this report we proposed a hybrid technique for intrusion detection using data mining algorithms.  ...  These two data mining techniques will be used for Intrusion detection in large horizontally distributed database.  ...  Here we detected intrusion through data mining method by combining two data mining technique Modified K means and Naive Bayes classification and formed a hybrid technique.  ... 
doi:10.15623/ijret.2016.0508025 fatcat:hwxsaihsvvcwpbthkv7nmnfctq

A Generic Review on Effective Intrusion Detection in Ad hoc Networks

G. Gopichand, RA.K. Saravanaguru
2016 International Journal of Electrical and Computer Engineering (IJECE)  
This paper provides a comparative survey on the various existing intrusion detection systems for Ad hoc networks based on the various approaches applied in the intrusion detection systems for providing  ...  Hence we call an Ad hoc network as a collection of nodes which are mobile in nature with a dynamic network infrastructure and forms a temporary network.  ...  IJECE ISSN: 2088-8708  Data mining Analysis The examples of data mining analysis technique are the unsupervised variants of anomaly based Intrusion detection systems [10] , [23] - [25] .  ... 
doi:10.11591/ijece.v6i4.10008 fatcat:rxywuqg6dza7no53kazuugypei

COMPARISON OF WEB - MINING TECHNIQUES - A SURVEY PAPER

Surender Singh, Rajinder Singh
2020 Zenodo  
Mining is a technique of extracting actionable information from the big pile of data. This paper surveys and compares the various web mining techniques which is an emerging field of data mining.  ...  Data Mining Technique [14] Fang-Yie Leu and Kai-Wei Hu This paper introduced Intrusion Detection and Identfication System (IDIS), which builds a profile for each user in an intranet to keep  ...  Here, a survey of the various data mining techniques that have been proposed towards the enhancement of IDSs and has shown the ways in which data mining has been known to aid the process of Intrusion Detection  ... 
doi:10.5281/zenodo.3608621 fatcat:43gdjhwxpjbrtiruiv6sst5n6i

An approach for efficient intrusion detection for KDD dataset: A survey

Namita Sharma, Bhupesh Gaur
2016 International Journal of Advanced Technology and Engineering Exploration  
To ensure anomaly awareness, their observed data can be used in accordance with data mining techniques to develop Intrusion Detection Systems (IDS) or Anomaly Detection Systems (ADS).  ...  Our study suggests the following gaps which can be considered as the future directions: 1) A data Mining technique which dynamic rule association can be fruitful. 2) Combination K-Means with Optimization  ... 
doi:10.19101/ijatee.2016.318006 fatcat:hrcudwk6wfh6bdamlcj6pj62pa

Survey anomaly detection in network using big data analytics

Y.S. Kalai Vani, Krishnamurthy
2017 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS)  
Analysing network flows, logs, and system events has been used for intrusion detection. Network flows, logs, and system events, etc. generate big data.  ...  data mining and machine learning, deep learning, and Big Data analytics in network intrusion detection.  ...  As the author(s) is (are) not a Government employee(s), this document was only reviewed for export controls, and improper Army association or emblem usage considerations.  ... 
doi:10.1109/icecds.2017.8390083 fatcat:6gij7behqjhezefwcxoflowtqe

AN INTELLIGENT NETWORK INTRUSION DETECTION USING DATA MINING TECHNIQUES

Mohd Afizi Mohd Shukran, Kamaruzaman Maskat
2015 Jurnal Teknologi  
Uniquely, our approach will integrate a newly developed data mining technique for data feature classification with techniques commonly used for human detection.  ...  Network Intrusion Detection is to detect malicious attacks to the networks for different uses from military to enterprise.  ...  Acknowledgement The author would like to thank Malaysia Ministry of Higher Education (MOHE) for financial assistance while conducting this project.  ... 
doi:10.11113/jt.v76.5891 fatcat:pin5h2yelvg45mdqnbuhe5oecq

A Survey on Various Data Mining Technique in Intrusion Detection System

Snehil Dahima, Dr. Jitendra Shitlani
2017 IOSR Journal of Computer Engineering  
Thus data mining techniques help to detect patterns in the data set and use these patterns to detect future intrusions.  ...  Data Mining based Intrusion Detection System is combined with Multi-Agent System to improve the performance of the IDS.  ...  Comparative study on applied data mining based intrusion detection techniques XI.  ... 
doi:10.9790/0661-1901016572 fatcat:uvxitnw7rfgljamsxqyojtwa6q

A Review on Various Methods of Intrusion Detection System

2020 Computer Engineering and Intelligent Systems  
This paper presents the survey on data mining techniques applied on intrusion detection systems for the effective identification of both known and unknown patterns of attacks, thereby helping the users  ...  Detection of Intrusion is an essential expertise business segment as well as a dynamic area of study and expansion caused by its requirement.  ...  Now a day's data mining techniques plays an important role in intrusion detection systems.  ... 
doi:10.7176/ceis/11-1-02 fatcat:ubcjgwamsrbzlovj5isaaeqpc4

Intrusion Detection based on K-Means Clustering and Ant Colony Optimization: A Survey

Chetan Gupta, Amit Sinhal, Rachana Kamble
2013 International Journal of Computer Applications  
Identifying intrusions is the process called intrusion detection. In simple manner the act of comprising a system is called intrusion.  ...  An intrusion detection system (IDS) inspects all inbound and outbound activity and identifies suspicious patterns that may indicate a system attack from someone attempting to compromise a system.  ...  A data Mining technique which dynamic rule association can be fruitful. 2. Combination K-Means with Optimization can increase the pattern recognition. 3.  ... 
doi:10.5120/13747-1555 fatcat:qkyx4wfb7fah5emy4quybuwzb4

A Review of Feature Reduction in Intrusion Detection System Based on Artificial Immune System and Neural Network

Uma Vishwakarma, Prof. Anurag Jain, Prof. Akriti Jain
2010 INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY  
Feature reduction plays an important role in intrusion detection system. The large amount of feature in network as well as host data effect the performance of intrusion detection method.  ...  Artificial immune system is biological inspired system work as mathematical model for feature reduction process. The neural network well knows optimization technique in other field.  ...  VII CONCLUSION AND FUTURE WORK In this paper we give a review of feature reduction technique for intrusion detection system.  ... 
doi:10.24297/ijct.v9i3.3338 fatcat:rz6yvj7g7nds7offjn6kdtusq4

Application of Data Mining Technique in Invasion Recognition

M.Charles Arockiaraj
2013 IOSR Journal of Computer Engineering  
Also, according to the invasion recognition's general process and data mining characteristic, it establishes a data mining-based model of network invasion recognition which is designed for its flaw.  ...  As a result, the missing report reduces greatly; the examination rate enhances; and network system's security strengthened.  ...  the detected data is beyond the threshold, that is a intrusion;if not, that it is a normal behavior.  ... 
doi:10.9790/0661-01032023 fatcat:usfn4ay2fbagvbyv5eu36capju

A Robust and Efficient Real Time Network Intrusion Detection System Using Artificial Neural Network In Data Mining

Renuka Devi Thanasekaran
2011 International Journal of Advanced Information Technology  
By combining the concepts of the Artificial Neural network and the Data mining technique of classification the drawbacks of the later is overcome.  ...  There is a need to safeguard the networks from known vulnerabilities and at the same time take steps to detect new and unseen, but possible, system abuses by developing more reliable and efficient intrusion  ...  Ahmad et al [7] has done a comparative study of the various technique that that are available for the network intrusion detection system using the data mining techniques.  ... 
doi:10.5121/ijitcs.2011.1402 fatcat:lqx3wyjcjrflpnqcc5bfwt2gqq
« Previous Showing results 1 — 15 out of 18,863 results