The False Positive Alert Reduction Using Data mining Techniques in Intrusion Detection System

Journal Title: International Research Journal of Computer Science - Year 2016, Vol 0, Issue 0

Abstract

Information security is a vital aspect of any organization. Most of the organizations relay and trust on the intrusion Detection System (IDS) which play important role in detecting intrusions in data network environment. The design of IDS varies with implementation of different IDS techniques involved. The design of IDS techniques keep changes as the trend of data network innovative attack methods gets updated day by day. Hence there is no single perfect solution is found for detecting the intrusions in the data network. In general IDS systems are complex and it is an ongoing process. There are dissimilar types of intrusion detection systems exist and pass through a common problem of rendering high volume of alerts and immense number of false positives. The false positive alert alters the space and time complexities of the IDS modules and gradually slows down the detection rate and performance of the system. This is the main motive behind the research of this paper. The objective of this research paper is to explore and suggest different techniques which help design in building the optimal intrusion Detection system of low cost and high performing computational capability and adaptability to various network environments for the results of false alert reduction, a high intrusion detection rate, risk management both detection and control the intrusions, finally to identify the real attacks from other false alarms and events of the system. This paper navigates through different associated studies of the last decade with providing a citation for further research in this domain. Various unresolved issues have also been covered in this manuscript.

Authors and Affiliations

Anthony Raj . A, Siddarama . S

Keywords

Related Articles

Multicast Routing and Data Mining in Wired Networks: A Comprehensive Study

Multicast routing is a collection leaning massage whose objective is to hold the spread of data from a dispatcher to all the recipient of a multicast group while annoying to use the obtainable bandwidth professionally, i...

Integrity Preserving Outsourcing Model in Cloud with Proxy Based Public Auditing

Cloud computing is the long dreamed vision of computing as a utility, where data owners can remotely store their data in the cloud to enjoy on-demand high-quality applications and services. Secured data storage and retri...

PERSONAL FINANCIAL APPLICATION BASED ON HYBRID MOBILE PLATFORM (UTILIZE SOCIAL MEDIA ACTIVITY)

Nowadays, mobile phone is not only used by many people to communicate, but also used to manage some information's. One of several information that can managed in mobile phone is the financial transaction. Managing the in...

Scope and Issues in Green Compiler

With the growing demand of electronic devices, efficient conservation of energy has become the major concern. Investments are on the datacentres that consume huge amount of energy at both hardware and software levels as...

ANALYSIS ON THE QUALITY OF THREE-PHASE TRANSFORMER OIL

Tangent delta is an electrical diagnostic method to determine the condition of the insulation. One of the insulation to know is transformer oil being a liquid insulation. In a transformer, insulation is an important part...

Download PDF file
  • EP ID EP182438
  • DOI -
  • Views 103
  • Downloads 0

How To Cite

Anthony Raj . A, Siddarama . S (2016). The False Positive Alert Reduction Using Data mining Techniques in Intrusion Detection System. International Research Journal of Computer Science, 0(0), 16-21. https://europub.co.uk/articles/-A-182438