A survey on Intrusion Detection System by Using Data Mining Based on Class-Association-Rule Mining Using GNP
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 12
Abstract
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are constructed by manual encoding of expert knowledge, changes to IDSs are expensive and slow. This paper describes a data mining framework for adaptively building Intrusion Detection (ID) models. Now security is considered as a major issue in networks, since the network has extended dramatically. Therefore, intrusion detection systems have attracted attention, as it has an ability to detect intrusion accesses effectively. These systems identify attacks and react by generating alerts or by blocking the unwanted data/traffic. The proposed system includes fuzzy logic with a data mining method which is a class-association rule mining method based on genetic algorithm. Due to the use of fuzzy logic, the proposed system can deal with mixed type of attributes and also avoid the sharp boundary problem. Genetic algorithm is used to extract many rules which are required for anomaly detection systems.
Authors and Affiliations
Mr. Shankar L. Tambe, Prof. Ms. Rasna Sharma
Hybrid Active Filter With Variable Conductance For Harmonic Suppression
The tuned passive filter and the line inductance, causes unintentional series and/or parallel resonances, may result in severe harmonic distortion in the industrial power system.Here we present a paper in which hybrid a...
Android application wound assessment System for Patients with Diabetes
Nowadays many doctors and nurses assess the wound just by examining the size of wound and clinical status, while the patient themselves can assess their wounds. It allows a patient to take care of themselves and perform...
Free Form Query Language for Database Queries
Query form is one of the most widely used user interfaces for querying databases. Traditional query forms are designed and pre-defined by developers or DBA in various information management systems. With the rapid devel...
slugPower Efficient Fir Filter Design
Finite Impulse Response (FIR) digital filter is basic component in communication systems and in many digital signal processing (DSP). FIR filter is broadly used in portable application with small area and low power. In...
A General E-Voting Scheme and Its Consequences
This paper introduces on electronic voting scheme, that have security context or known as e-trusted voting scheme. In this study, the prototype builds based on secured and trusted framework for electronic voting In this...