Intrusion detection using clustering

  • Bharti K
  • Shukla S
  • Jain S
N/ACitations
Citations of this article
17Readers
Mendeley users who have this article in their library.

Abstract

In increasing trends of network environment every one gets connected to the system. So there is need of securing information, because there are lots of security threats are present in network environment. A number of techniques are available for intrusion detection. Data mining is the one of the efficient techniques available for intrusion detection. Data mining techniques may be supervised or unsuprevised.Various Author have applied various clustering algorithm for intrusion detection, but all of these are suffers form class dominance, force assignment and No Class problem. This paper proposes a hybrid model to overcome these problems. The performance of proposed model is evaluated over KDD Cup 1999 data set.

Cite

CITATION STYLE

APA

Bharti, K. K., Shukla, S., & Jain, S. (2010). Intrusion detection using clustering. International Journal of Computer and Communication Technology, 248–255. https://doi.org/10.47893/ijcct.2010.1052

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free