Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A Study on Data Analysis for Intrusion Detection


Affiliations
1 Department of Computer Science, Sri Ramakrishna College of Arts and Science for Women, Coimbatore, India
     

   Subscribe/Renew Journal


Discovering hidden value in your data warehouse. Data mining, the extraction of hidden predictive information from large databases, is a powerful…

There is a huge amount of data available in the Information Industry. This data is of no use until it is converted into useful information. It is necessary to analyze this huge amount of data and extract useful information from it.Extraction of information is not the only process we need to perform; data mining also involves other processes such as Data Cleaning, Data Integration, Data Transformation, Data Mining, Pattern Evaluation and Data Presentation. Once all these processes are over, we would be able to use this information in many applications such as Fraud Detection, Market Analysis, Production Control, Science Exploration, etc.


Keywords

Analysis, Hidden, Information, Evaluation, Transformation.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 234

PDF Views: 2




  • A Study on Data Analysis for Intrusion Detection

Abstract Views: 234  |  PDF Views: 2

Authors

D. Anitha
Department of Computer Science, Sri Ramakrishna College of Arts and Science for Women, Coimbatore, India
P. Devipriya
Department of Computer Science, Sri Ramakrishna College of Arts and Science for Women, Coimbatore, India

Abstract


Discovering hidden value in your data warehouse. Data mining, the extraction of hidden predictive information from large databases, is a powerful…

There is a huge amount of data available in the Information Industry. This data is of no use until it is converted into useful information. It is necessary to analyze this huge amount of data and extract useful information from it.Extraction of information is not the only process we need to perform; data mining also involves other processes such as Data Cleaning, Data Integration, Data Transformation, Data Mining, Pattern Evaluation and Data Presentation. Once all these processes are over, we would be able to use this information in many applications such as Fraud Detection, Market Analysis, Production Control, Science Exploration, etc.


Keywords


Analysis, Hidden, Information, Evaluation, Transformation.