A Survey on Intrusion Detection System Using Data Mining Techniques
نویسنده
چکیده
Nowadays, an increasing number of populations are accessing the Internet for commercial services which is the major cause for attack. Threats are created everyday by an individual or by the organization that attacks the network system. Unusual Malicious activities and unauthorized access are identified by observing the network in Intrusion Detection System. IDS is a passive monitoring system, it warns for suspicious activity but does not prevent them. Various techniques are proposed in IDS to identify attacks or threats in the system. An Intrusion Detection System (IDS) monitors the network for any suspicious or malicious activity and alarms the network administrator for any kind of vulnerabilities. Its main goal is to protect the data’s integrity, confidentiality, or availability of the resources. IDS use data mining techniques to detect intrusions. This survey studies various techniques like k-means clustering, ANN, fuzzy neural network SVM classifiers, AODV based LDK model with AES , k-nearest neighbor classifier, GNS, Naive Bayes, Support vector machines (SVM), J48(C45) with Random Forest, Random Forest with Random Tree Classifiers. All these techniques have been implemented using serial algorithm. IDS have significant overhead in CPU time and memory used by these techniques and so recently researchers are focusing on multi-core CPU to achieve average speedup compared to serial implementation. GPUs act as co-processors which grabs the attention due to their high performance capabilities.
منابع مشابه
Intrusion Detection System Using Data Mining
This paper analysis and criticizes the way of using, functioning the intrusion detection system in data mining. Understanding the techniques. A survey on Data Mining based Intrusion Detection Systems phase, intrusion detection system is studied. are analysed using any network administrator. 1Data Mining and Optimization Research Group (DMO), Centre for Artificial Intrusion Detection System (IDS...
متن کاملIntrusion Detection based on a Novel Hybrid Learning Approach
Information security and Intrusion Detection System (IDS) plays a critical role in the Internet. IDS is an essential tool for detecting different kinds of attacks in a network and maintaining data integrity, confidentiality and system availability against possible threats. In this paper, a hybrid approach towards achieving high performance is proposed. In fact, the important goal of this paper ...
متن کاملData Mining Techniques For Intrusion Detection System
Reddy et al (20) also presented a survey of various data mining techniques for intrusion detection system. Subramanian et al (21) presented the performance. Developing a Hybrid Intrusion Detection System Using Data Mining for A data mining technique called common path mining is used to automatically. The proposed hybrid technique combines data mining approaches like K Novel intrusion detection ...
متن کاملOverview of Intrusion Detection Techniques in Database
Data is one of the most valuable assets in today's world and is used in the everyday life of every person and organization. This data stores in a database in order to restore and maintain its efficiently. Since there is a database that can be exploited by SQL injection attacks, internal threats, and unknown threats, there are always concerns about the loss or alteration of data by unauthorized ...
متن کاملA Survey on Intrusion Detection System in Data Mining
This paper presents a survey of techniques of intrusion detection system using supervised and unsupervised learning. The techniques are categorized based upon different approaches like Statistics, Data mining, Neural Network Based and Self Organizing Maps Based approaches. The detection type is borrowed from intrusion detection as either misuse detection or anomaly detection. It provides the re...
متن کاملA Complete Study on Intrusion Detection Using Data Mining Techniques
In recent years the security in data mining applications has become crucial in protecting public and private computing systems. Contemporary computing applications are facing numerous complex problems related to various internal or external attacks. This paper mainly focuses on a comprehensive study on Intrusion Detection systems. In modern world of security many researchers have proposed vario...
متن کامل