Review paper on Intrusion Detection Using Data Mining strategies

srinivas l, Phaniraj Kumar T


In Information Security, Intrusion location is the demonstration of distinguishing activities that endeavor to bargain the uprightness, classification, or accessibility of an asset. Intrusion location does not, when all is said in done, incorporate aversion of Intrusions. This paper is focusing on information mining systems that are being utilized for such purposes. Points of interest and burdens of these systems have been talked about in this paper. Present day Intrusion discovery applications confronting complex issues. These applications must be require extensible, dependable, simple to oversee, and have low upkeep cost.


IDS, Data Mining

Full Text:



. F Zhang, An effective Feature selection approach for Network Intrusion Detection. IEEE Eigth International Conference, 2013.

Ektafa, Intrusion Detection Using Data Mining Techniques”,IEEE Trans., 2010.

Zibusiso Dewa and Leandros A. Maglaras, Data Mining and Intrusion Detection Systems.



  • There are currently no refbacks.

Copyright (c) 2018 International Journal of Advanced Research in Computer Science