Intrusion Detection System Based on Data Mining Techniques

  • Kumra A
  • Jeberson W
  • Jeberson K
N/ACitations
Citations of this article
10Readers
Mendeley users who have this article in their library.

Abstract

Network security is one of the most important non-functional requirements in a system. Over the years, many software solutions have been developed to enhance network security. Intrusion Detection System (IDS) we have provided an overview of different types of intrusion Detection Systems, the advantages and disadvantages of the same. The need for IDS in a system environment and the generic blocks in IDS is also mentioned.The examples are as follows: (1) Misuse intrusion detection system that uses state transition analysis approach, (2) Anomaly based system that uses payload modeling and (3) Hybrid model that combines the best practices of Misuse and Anomaly based intrusion systems.

Cite

CITATION STYLE

APA

Kumra, A., Jeberson, W., & Jeberson, K. (2017). Intrusion Detection System Based on Data Mining Techniques. Oriental Journal of Computer Science and Technology, 10(2), 491–496. https://doi.org/10.13005/ojcst/10.02.33

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free