A Survey on Intrusion Detection System in Data Mining
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 6
Abstract
This paper presents a survey of techniques of intrusion detection system using supervised and unsupervised learning. The techniques are categorized based upon different approaches like Statistics, Data mining, Neural Network Based and Self Organizing Maps Based approaches. The detection type is borrowed from intrusion detection as either misuse detection or anomaly detection. It provides the reader with the major advancement in the malware research using these approaches the features and categories in the surveyed work based upon the above stated categories. This served as the major contribution of this paper.
Authors and Affiliations
Sahilpreet Singh, , 2Meenakshi Bansal
A KNOWLEDGE BASED APPROACH FOR AUTOMATIC DATABASE NORMALIZATION
Normalization is a process of analyzing the given relational schemas based on the functional dependencies and using primary key to achieve minimum data redundancy. Normalization is one of the key issues to be carried out...
Experimental And Numerical Analysis Of Temperature Distribution In Submerged Arc Welding Process
In large steel fabrication industries such as shipbuilding, and high-speed train guide way, the problem of residual stresses and overall distortion has been and continues to be a major issue. In the last few decades,...
A Model for identifying Guilty Agents in Data Transmission
Abstract-- This research paper presents a formal method for representing and detecting inconsistencies of combined secrecy models is to detect when the PC distributor’s sensitive data has been leaked by their a...
Rule Based Technique detecting Security attack for Wireless Sensor network using fuzzy logic
This paper represents the rule based technique which helps to detect the security attack in the Wireless Sensor network .There are many type of security attack which effects on the wireless sensor network. To demonst...
Egoistic superimpose Network Formation and Preservation
t—A introductory issue essential many superimpose network applications ranging from routing to peer-to-peer file distribution is that of the network configuration, i.e., flop new arrivals into an presented overlie,...