首页    期刊浏览 2024年09月20日 星期五
登录注册

文章基本信息

  • 标题:GIntrusion Detection Using Data Mining Technique (Classification)
  • 本地全文:下载
  • 作者:Dr.D.Aruna Kumari ; N.Tejeswani ; G.Sravani
  • 期刊名称:International Journal of Computer Science and Information Technologies
  • 电子版ISSN:0975-9646
  • 出版年度:2015
  • 卷号:6
  • 期号:2
  • 页码:1750-1754
  • 出版社:TechScience Publications
  • 摘要:This paper analysis and criticizes the way of using, functioning the intrusion detection system in data mining. Understanding the techniques and characteristics in IDS can improve the idealogy . We need to understand the methods and types involved in IDS and in which way they operate when an attack occurred. Intrusion Detection System (IDS) which is the increasingly key element of systems security is used to identify the malicious activities in a computer system and network. There are different approaches in IDS systems. An intrusion detection system (IDS) checks all the results in network activity and identifies suspicious patterns that may indicate network attack or system attacks from someone attempting to make threats or compromise a system. There IDS is being classified by .Misuse detection ,Anomaly detection.The methods and the knowledge used in techniques of intrusion detection is used to detect the threats occurred in many areas like banks, etc.
  • 关键词:Data mining;intusion;detection;preprocessing;classification
国家哲学社会科学文献中心版权所有