Use of Data Mining Techniques in Intrusion Detection – A Survey

Regardless of developing data framework broadly, security has stayed one hard-hitting territory for PCs and, in addition, systems. For that another innovation can be utilized is called Intrusion Detection System. It distinguishes the intrusions like viruses, Trojan horses and so on. Data mining is utilized to clean, characterize and inspect expansive measure of system information. In this paper, the survey of use of different data mining techniques for the detection of intrusions in the network has been done.

[1]  Brijesh Sharma,et al.  A Design and Implementation of Intrusion Detection System by Using Data Mining , 2014, 2014 Fourth International Conference on Communication Systems and Network Technologies.

[2]  Ahmed E. Youssef,et al.  NETWORK INTRUSION DETECTION USING DATA MINING AND NETWORK BEHAVIOUR ANALYSIS , 2011 .

[3]  Han Li Research and Implementation of an Anomaly Detection Model Based on Clustering Analysis , 2010, 2010 International Symposium on Intelligence Information Processing and Trusted Computing.

[4]  Jiawei Han,et al.  Data Mining: Concepts and Techniques , 2000 .

[5]  Cheng Xiang,et al.  Design of Multiple-Level Hybrid Classifier for Intrusion Detection System , 2005, 2005 IEEE Workshop on Machine Learning for Signal Processing.

[6]  A. John,et al.  Survey on data mining techniques to enhance intrusion detection , 2012, 2012 International Conference on Computer Communication and Informatics.

[7]  R. R. Deshmukh,et al.  Data Mining Classification , 2016 .

[8]  Shingo Mabu,et al.  An Intrusion-Detection Model Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[9]  Ketan Sanjay Desale,et al.  Efficient Intrusion Detection System Using Stream Data Mining Classification Technique , 2015, 2015 International Conference on Computing Communication Control and Automation.

[10]  B. R. Madhu,et al.  Data mining based CIDS: Cloud intrusion detection system for masquerade attacks [DCIDSM] , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).

[11]  Solane Duque,et al.  Using Data Mining Algorithms for Developing a Model for Intrusion Detection System (IDS) , 2015, Complex Adaptive Systems.

[12]  P. Anitha,et al.  Efficient classification mechanism for network intrusion detection system based on data mining techniques: A survey , 2014, 2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO).

[13]  Shi-Jinn Horng,et al.  A novel intrusion detection system based on hierarchical clustering and support vector machines , 2011, Expert Syst. Appl..