K. Wankhade, G. H. Raisoni, Sadia Patka, M. T. Student, Ravinrda Thool
{"title":"An Overview of Intrusion Detection Based on Data Mining Techniques","authors":"K. Wankhade, G. H. Raisoni, Sadia Patka, M. T. Student, Ravinrda Thool","doi":"10.1109/CSNT.2013.134","DOIUrl":null,"url":null,"abstract":"Intrusion Detection System (IDS) is a vital component of any network in today's world of Internet. IDS are an effective way to detect different kinds of attacks in interconnected network. An effective Intrusion Detection System requires high accuracy and detection rate as well as low false alarm rate. Different Data Mining techniques such as clustering and classification are proving to be useful for analyzing and dealing with large amount of network traffic. This paper presents various data mining techniques applied on intrusion detection systems for the effective identification of both known and unknown patterns of attacks, to develop secure information systems.","PeriodicalId":111865,"journal":{"name":"2013 International Conference on Communication Systems and Network Technologies","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"35","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 International Conference on Communication Systems and Network Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSNT.2013.134","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 35
Abstract
Intrusion Detection System (IDS) is a vital component of any network in today's world of Internet. IDS are an effective way to detect different kinds of attacks in interconnected network. An effective Intrusion Detection System requires high accuracy and detection rate as well as low false alarm rate. Different Data Mining techniques such as clustering and classification are proving to be useful for analyzing and dealing with large amount of network traffic. This paper presents various data mining techniques applied on intrusion detection systems for the effective identification of both known and unknown patterns of attacks, to develop secure information systems.