Computer Security and Intrusion detection System - A Data Mining Based Approach

Journal Title: International Journal of Scientific Research and Management - Year 2017, Vol 5, Issue 6

Abstract

With an increased understanding of how systems work, intruders have become skilled at determining weaknesses in systems and exploiting them to obtain such increased privileges that they can do anything on the system. Intruders also use patterns of intrusion that a re difficult to trace and identify. They frequently use several levels of indirection before breaking into target systems and rarely indulge in sudden bursts of suspicious or anomalous activity. They also cover their tracks so that their activity on the pe netrated system is not easily discovered. We must have measures in place to detect security breaches, i.e., identify intruder s and intrusions. Intrusion detection systems fill this role and usually form the last line of defense in the overall protection sc heme of a computer system. They are useful not only in detecting successful breaches of security, but also in monitoring attempts to br each security, which provides important information for timely countermeasures. This paper focused on how data mining is used for Intrusion detection Syste

Authors and Affiliations

Neetu Anand

Keywords

Related Articles

A Study Over Survey On The Life Style Of Young Students

The survey has been conducted over 598 students selected from 5 different schools of Palampur & Baijnath Tehsil of Distt. Kangra, H.P from class 11 th and 12 th having same social and cultural background. The students we...

Knowledge Management and Role of ICT for Development

Knowledge Management has become the key factor for the success of all organization. KM is all about making available the right knowledge to the right people. It is about makin g sure that an organization...

Impact of FDI on Employment Generation in India

Job creation is one of the main challenges for developing cou ntries. Many people believe that FDI can generate many benefits to help solve the capital shortage problem in developing countries. But in...

Modified Fuzzy method for Vertical Handoff in Heterogeneous Networks

There are various types of networks in wireless technologies, having different parameters and their specifications and thus having different QoS (Quality of Service). So for moving the MS from...

Thermal Behavior 0f Semicoductor Bismuth Iodate [Bi(IO3)3] Crystals Grown by Silica Gel

The Bismuth Iodate[Bi(IO3)3] crystals have been grown in Sodium meta silicate gel using the Single diffusion method at room temperature. The grown crystals were characterized by thermo analyti...

Download PDF file
  • EP ID EP313774
  • DOI -
  • Views 43
  • Downloads 0

How To Cite

Neetu Anand (2017). Computer Security and Intrusion detection System - A Data Mining Based Approach. International Journal of Scientific Research and Management, 5(6), -. https://europub.co.uk/articles/-A-313774