Data Mining and Intrusion Detection Systems
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 1
Abstract
The rapid evolution of technology and the increased connectivity among its components, imposes new cyber-security challenges. To tackle this growing trend in computer attacks and respond threats, industry professionals and academics are joining forces in order to build Intrusion Detection Systems (IDS) that combine high accuracy with low complexity and time efficiency. The present article gives an overview of existing Intrusion Detection Systems (IDS) along with their main principles. Also this article argues whether data mining and its core feature which is knowledge discovery can help in creating Data mining based IDSs that can achieve higher accuracy to novel types of intrusion and demonstrate more robust behaviour compared to traditional IDSs.
Authors and Affiliations
Zibusiso Dewa, Leandros A. Maglaras
Forensic Analysis using Text Clustering in the Age of Large Volume Data: A Review
Exploring digital devices in order to generate digital evidence related to an incident being investigated is essential in modern digital investigation. The emergence of text clustering methods plays an important role in...
Comparative Analysis of Raw Images and Meta Feature based Urdu OCR using CNN and LSTM
Urdu language uses cursive script which results in connected characters constituting ligatures. For identifying characters within ligatures of different scales (font sizes), Convolution Neural Network (CNN) and Long Shor...
A Model for Classification Secondary School Student Enrollment Approval Based on E-Learning Management System and E-Games
Student is the key of the educational process, where students’ creativity and interactions are strongly encouraged. There are many tools embedded in Learning Management Systems (LMS) that considered as a goal evaluation...
RIN-Sum: A System for Query-Specific Multi-Document Extractive Summarization
In paper, we have proposed a novel summarization framework to generate a quality summary by extracting Relevant-Informative-Novel (RIN) sentences from topically related document collection called as RIN-Sum. In the propo...
Fragile Watermarking based on Linear Cellular Automata using Manhattan Distances for 2D Vector Map
There has been a growing demand for publishing maps in secure digital format, since this ensures the integrity of data. This had lead us to put forward a method of detecting and locating modification data that is extreme...