Intrusion detection using data mining

被引:2
|
作者
Puthran, Shubha [1 ]
Shah, Ketan [1 ]
机构
[1] Puthran, Shubha
[2] Shah, Ketan
来源
Puthran, Shubha (shubha.puthran@nmims.edu) | 1600年 / Inderscience Publishers卷 / 09期
关键词
Clustering algorithms - Data mining - Decision trees;
D O I
10.1504/IJCISTUDIES.2020.111036
中图分类号
学科分类号
摘要
引用
收藏
页码:292 / 306
相关论文
共 50 条
  • [21] Intrusion Detection System using Stream Data Mining and Drift Detection Method
    Kumar, Manish
    Hanumanthappa, M.
    2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [22] Intelligent Network Intrusion Detection System using Data Mining Techniques
    Sultana, Amreen
    Jabbar, M. A.
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2016, : 329 - 333
  • [23] Intrusion Detection System using Fuzzy Logic and Data Mining Technique
    Chapke, Prajkta P.
    Deshmukh, Rupali R.
    ICARCSET'15: PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON ADVANCED RESEARCH IN COMPUTER SCIENCE ENGINEERING & TECHNOLOGY (ICARCSET - 2015), 2015,
  • [24] Anomaly Based Intrusion Detection Using Data Mining and String Metrics
    Nikolova, Evgeniya
    Jecheva, Veselina
    2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, : 440 - 444
  • [25] Intrusion Detection System by Using Hybrid Algorithm of Data Mining Technique
    Foroushani, Zohreh Abtahi
    Li, Yue
    PROCEEDINGS OF 2018 7TH INTERNATIONAL CONFERENCE ON SOFTWARE AND COMPUTER APPLICATIONS (ICSCA 2018), 2018, : 119 - 123
  • [26] Network Intrusion Detection System Using various data mining techniques
    DikshantGupta
    SuhaniSinghal
    Malik, Shamita
    Singh, Archana
    2016 INTERNATIONAL CONFERENCE ON RESEARCH ADVANCES IN INTEGRATED NAVIGATION SYSTEMS (RAINS), 2016,
  • [27] Investigating and evaluating behavioural profiling and intrusion detection using data mining
    Singh, H
    Furnell, S
    Lines, B
    Dowland, P
    INFORMATION ASSURANCE IN COMPUTER NETWORKS: METHODS, MODELS AND ARCHITECTURES FOR NETWORK SECURITY, PROCEEDINGS, 2001, 2052 : 153 - 158
  • [28] A NOVEL SIGNATURE SEARCHING FOR INTRUSION DETECTION SYSTEM USING DATA MINING
    Ding, Ya-Li
    Li, Lei
    Luo, Hong-Qi
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-6, 2009, : 122 - 126
  • [29] Overview of Intrusion Detection Using Data-Mining and the features selection
    El Moussaid, Nadya
    Toumanari, Ahmed
    2014 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2014, : 1269 - 1273
  • [30] Intrusion detection and identification system using data mining and forensic techniques
    Len, Fang-Yie
    Hu, Kai-Wei
    Jiang, Fuu-Cheng
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2007, 4752 : 137 - +