Data Mining Approaches on Network Data: Intrusion Detection System
Main Article Content
Abstract
In the modern era having tremendous growth and the usage of networking over computer systems and its applications mainly focuses to make our system as secure as possible. So with the help of intrusion detection system we can implement security on the system that protects our system data to access from unauthorized persons. Intrusion Detection System (IDS) takes responsibility to monitor the networks or host packets to find the malicious activities which occurs in the system. This paper consists data mining techniques to implement on IDS to identify both of the attacks that is known and unknown attacking patterns, so IDS helps the user to secure the information system. A Network Intrusion Detection System (NIDS) must be installed into the system to work as software application for detecting and monitoring the network activities and also protects from malicious and illegal access of devices. Data mining provides a way to analyze, classify, clean and eliminate the large amount of network data. Therefore, to come out from huge volume of dataset we use different data mining techniques like as classification, clustering along with association rules to analyze the network traffic and make the information as confidentiality and integrity.
Keywords: Intrusion Detection System, Classification, Clustering, Data Mining, Misuse Detection, Anomaly Detection, False Alarm Rate, Network Security
Keywords: Intrusion Detection System, Classification, Clustering, Data Mining, Misuse Detection, Anomaly Detection, False Alarm Rate, Network Security
Downloads
Download data is not yet available.
Article Details
Section
Articles
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.