Intrusion Detection Models Based on Data Mining
نویسندگان
چکیده
منابع مشابه
Data Mining Based Intrusion Detection
With popularization of internet, internet attack cases are increasing, and attack methods differs each day, thus information safety problem has became a significant issue all over the world. Nowadays, it is an urgent need to detect, identify and hold up such attacks effectively. Intrusion detection is the act of detecting actions that attempt to compromise the confidentiality, integrity or avai...
متن کاملData Mining Based Online Intrusion Detection
–Nowadays, as information systems are more open to the Internet, the importance of secure networks is tremendously increased. New intelligent Intrusion Detection Systems (IDSs) which are based on sophisticated algorithms rather than current signature-base detections are in demand. There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgrad...
متن کاملReal Time Data Mining-based Intrusion Detection
In this paper, we present an overview of our research in real time data mining-based intrusion detection systems (IDSs). We focus on issues related to deploying a data mining-based IDS in a real time environment. We describe our approaches to address three types of issues: accuracy, efficiency, and usability. To improve accuracy, data mining programs are used to analyze audit data and extract f...
متن کاملIntrusion Detection System Based on Data Mining Techniques
Network security is one of the most important non-functional requirements in a system. Over the years, many software solutions have been developed to enhance network security. Intrusion Detection System (IDS) we have provided an overview of different types of intrusion Detection Systems, the advantages and disadvantages of the same. The need for IDS in a system environment and the generic block...
متن کاملA Review on Intrusion Detection System Based Data Mining Techniques
1,2 PG Scholar, Department of CSE & IT, Madhav Institute of Technology and Science, Gwalior, India ---------------------------------------------------------------------***--------------------------------------------------------------------Abstract In today’s scenario to maintain the security of network system is important. We need a secure and safe network system towards intruders attack. Intru...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computational Intelligence Systems
سال: 2012
ISSN: 1875-6891,1875-6883
DOI: 10.1080/18756891.2012.670519