Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Analysis and Study of Intrusion Detection Systems Using Data Mining Machine Learning Techniques


Affiliations
1 CSE Dept., Guru Nanak Engineering College, India
2 Guru Nanak Engineering College, Affiliated to JNTU, Hyderabad, India
     

   Subscribe/Renew Journal


Intrusions pose a serious security problem in the network environment. Security of computer systems is very important to their utility and acceptance. Security in the network environment is maintained by monitoring the data. Security of a network also depends on the amount of data to be monitored. Unfortunately the available amount of network audit data instances is usually large that usually demands human labeling which is a tedious and time consuming task as well as proven to be expensive. To solve similar kinds of problems such as mentioned above, like the human interventions or high level of data biasing intrusion detection systems implement a suite of techniques that use data mining machine learning systems to identify the attacks against computers and network infrastructures. The suites of IDS techniques are widely discussed through out the paper.

Keywords

Data Mining, Intrusion, Intrusion Detection Systems, Machine Learning Systems.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 266

PDF Views: 2




  • Analysis and Study of Intrusion Detection Systems Using Data Mining Machine Learning Techniques

Abstract Views: 266  |  PDF Views: 2

Authors

Rishi Sayal
CSE Dept., Guru Nanak Engineering College, India
P. Harsha
Guru Nanak Engineering College, Affiliated to JNTU, Hyderabad, India

Abstract


Intrusions pose a serious security problem in the network environment. Security of computer systems is very important to their utility and acceptance. Security in the network environment is maintained by monitoring the data. Security of a network also depends on the amount of data to be monitored. Unfortunately the available amount of network audit data instances is usually large that usually demands human labeling which is a tedious and time consuming task as well as proven to be expensive. To solve similar kinds of problems such as mentioned above, like the human interventions or high level of data biasing intrusion detection systems implement a suite of techniques that use data mining machine learning systems to identify the attacks against computers and network infrastructures. The suites of IDS techniques are widely discussed through out the paper.

Keywords


Data Mining, Intrusion, Intrusion Detection Systems, Machine Learning Systems.