A Survey on Intrusion Detection System in Data Mining 

Abstract

This paper presents a survey of techniques of intrusion detection system using supervised and unsupervised learning. The techniques are categorized based upon different approaches like Statistics, Data mining, Neural Network Based and Self Organizing Maps Based approaches. The detection type is borrowed from intrusion detection as either misuse detection or anomaly detection. It provides the reader with the major advancement in the malware research using these approaches the features and categories in the surveyed work based upon the above stated categories. This served as the major contribution of this paper.  

Authors and Affiliations

Sahilpreet Singh, , 2Meenakshi Bansal

Keywords

Related Articles

A KNOWLEDGE BASED APPROACH FOR AUTOMATIC DATABASE NORMALIZATION

Normalization is a process of analyzing the given relational schemas based on the functional dependencies and using primary key to achieve minimum data redundancy. Normalization is one of the key issues to be carried out...

Experimental And Numerical Analysis Of Temperature Distribution In Submerged Arc Welding Process  

In large steel fabrication industries such as shipbuilding, and high-speed train guide way, the problem of residual stresses and overall distortion has been and continues to be a major issue. In the last few decades,...

A Model for identifying Guilty Agents in Data Transmission  

Abstract-- This research paper presents a formal method for representing and detecting inconsistencies of combined secrecy models is to detect when the PC distributor’s sensitive data has been leaked by their a...

Rule Based Technique detecting Security attack for Wireless Sensor network using fuzzy logic  

This paper represents the rule based technique which helps to detect the security attack in the Wireless Sensor network .There are many type of security attack which effects on the wireless sensor network. To demonst...

Egoistic superimpose Network Formation and Preservation  

t—A introductory issue essential many superimpose network applications ranging from routing to peer-to-peer file distribution is that of the network configuration, i.e., flop new arrivals into an presented overlie,...

Download PDF file
  • EP ID EP120526
  • DOI -
  • Views 68
  • Downloads 0

How To Cite

Sahilpreet Singh, , 2Meenakshi Bansal (2013). A Survey on Intrusion Detection System in Data Mining . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 2(6), 2190-2194. https://europub.co.uk/articles/-A-120526