Model for Intrusion Detection System with Data Mining
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 4
Abstract
Today internet has become very popular medium to communicate between users publicly, due to this, lots of intruder has spread across the internet that perform malicious activity and attack to destroy useful information. There are many techniques to detect cyber-attacks and malicious activities in computer systems in which networks Intrusion detection systems (IDSs) is one of them. It is well-known and widely-used security tool. This paper is presenting general study of the existing techniques of intrusion detection using data mining methods. Furthermore there is proposed model of IDS which is the combination of clustering and classification technique to. At the time of experimental analysis we will compare performance of the proposed IDS with existing IDS in terms of execution time and memory utilization.
Authors and Affiliations
Deepak Upadhyaya , Shubha Jain
A New Approach to Improve Power Quality and Energy Saving Scheme by Dimming of Light Intensity
Energy flow in the world is unidirectional, not cyclic. So huge uncontrolled consumption of conventional energy may cause least avail ability of itself. We should preserve it, reduce its consumption, and try to be...
Investigation of SAR inside Different Enclosures and Reduction Techniques
Electromagnetic interface with a human head exposed to internal antenna is calculated. A human head phantom with dielectric properties inside an enclosure is designed. The radiation pattern of Planar Inverted F An...
GClustering Algorithm
—Graph clustering poses significant challenges because of the complex structures which may be present in the underlying data. The massive size of the underlying graph makes explicit structural enumeration very diff...
Traffic Management on Road using Density Aware Routing
These Traditionally traffic safety was addressed by traffic awareness and passive safety measures like solid chassis, seat belts, air bags etc. With the recent breakthroughs in the domain of mobile ad hoc networks, th...
Harvesting collective Images for Bi-Concept exploration
Noised positive as well as instructive pessimistic research examples commencing the communal web, to become skilled at bi-concept detectors beginning these examples, and to apply them in a search steam engine for retriev...