Open Access Open Access  Restricted Access Subscription Access

Intrusion Detection System Based on Data Mining Techniques


Affiliations
1 Department of Computer Science and Information Technology, SHUATS, India
 

Network security is one of the most important non-functional requirements in a system. Over the years, many software solutions have been developed to enhance network security. Intrusion Detection System (IDS) we have provided an overview of different types of intrusion Detection Systems, the advantages and disadvantages of the same. The need for IDS in a system environment and the generic blocks in IDS is also mentioned.The examples are as follows: (1) Misuse intrusion detection system that uses state transition analysis approach, (2) Anomaly based system that uses payload modeling and (3) Hybrid model that combines the best practices of Misuse and Anomaly based intrusion systems.


Keywords

Intrusion Detection System, Web Log Files, J48 Decision Tree.
User
Notifications
Font Size


  • Intrusion Detection System Based on Data Mining Techniques

Abstract Views: 278  |  PDF Views: 0

Authors

Abhinav Kumra
Department of Computer Science and Information Technology, SHUATS, India
W. Jeberson
Department of Computer Science and Information Technology, SHUATS, India
Klinsega Jeberson
Department of Computer Science and Information Technology, SHUATS, India

Abstract


Network security is one of the most important non-functional requirements in a system. Over the years, many software solutions have been developed to enhance network security. Intrusion Detection System (IDS) we have provided an overview of different types of intrusion Detection Systems, the advantages and disadvantages of the same. The need for IDS in a system environment and the generic blocks in IDS is also mentioned.The examples are as follows: (1) Misuse intrusion detection system that uses state transition analysis approach, (2) Anomaly based system that uses payload modeling and (3) Hybrid model that combines the best practices of Misuse and Anomaly based intrusion systems.


Keywords


Intrusion Detection System, Web Log Files, J48 Decision Tree.

References





DOI: https://doi.org/10.13005/ojcst%2F10.02.33