Model for Intrusion Detection System with Data Mining
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 4
Abstract
Today internet has become very popular medium to communicate between users publicly, due to this, lots of intruder has spread across the internet that perform malicious activity and attack to destroy useful information. There are many techniques to detect cyber-attacks and malicious activities in computer systems in which networks Intrusion detection systems (IDSs) is one of them. It is well-known and widely-used security tool. This paper is presenting general study of the existing techniques of intrusion detection using data mining methods. Furthermore there is proposed model of IDS which is the combination of clustering and classification technique to. At the time of experimental analysis we will compare performance of the proposed IDS with existing IDS in terms of execution time and memory utilization.
Authors and Affiliations
Deepak Upadhyaya , Shubha Jain
An Efficient Sharing of Personal Health Records Using DABE in Secure Cloud Environment
Cloud computing has emerged as one of the most influential paradigms in the IT industry for last few years. Normally data owners and service providers are not in the same trusted domain in cloud computing. Personal healt...
Anomaly Exposure in Network Traffic and its collision: a Survey
Antagonistic network traffic is frequently "diverse” from kind traffic in ways that can be classified without knowing the way of the attack. Anomaly exposure is a significant problem that has been investigates wi...
A Modified Hierarchical Clustering Algorithm for Document Clustering
Clustering is the division of data into groups called as clusters. Document clustering is done to analyse the large number of documents distributed over various sites. The similar documents are grouped together to for...
An Enhanced and efficient mechanism to detect Sybil attack in Wireless Sensor Networks
Wireless sensor networks are used for many different applications these days such as in environment applications, military applications, queue tracking, etc. In today’s scenario, security in WSN is one of the major iss...
A Review: Content Base Image Mining Technique for Image Retrieval Using Hybrid Clustering