A Survey on Intrusion Detection System Using Data Mining Techniques

نویسنده

  • Blessy Boaz
چکیده

Nowadays, an increasing number of populations are accessing the Internet for commercial services which is the major cause for attack. Threats are created everyday by an individual or by the organization that attacks the network system. Unusual Malicious activities and unauthorized access are identified by observing the network in Intrusion Detection System. IDS is a passive monitoring system, it warns for suspicious activity but does not prevent them. Various techniques are proposed in IDS to identify attacks or threats in the system. An Intrusion Detection System (IDS) monitors the network for any suspicious or malicious activity and alarms the network administrator for any kind of vulnerabilities. Its main goal is to protect the data’s integrity, confidentiality, or availability of the resources. IDS use data mining techniques to detect intrusions. This survey studies various techniques like k-means clustering, ANN, fuzzy neural network SVM classifiers, AODV based LDK model with AES , k-nearest neighbor classifier, GNS, Naive Bayes, Support vector machines (SVM), J48(C45) with Random Forest, Random Forest with Random Tree Classifiers. All these techniques have been implemented using serial algorithm. IDS have significant overhead in CPU time and memory used by these techniques and so recently researchers are focusing on multi-core CPU to achieve average speedup compared to serial implementation. GPUs act as co-processors which grabs the attention due to their high performance capabilities.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Intrusion Detection System Using Data Mining

This paper analysis and criticizes the way of using, functioning the intrusion detection system in data mining. Understanding the techniques. A survey on Data Mining based Intrusion Detection Systems phase, intrusion detection system is studied. are analysed using any network administrator. 1Data Mining and Optimization Research Group (DMO), Centre for Artificial Intrusion Detection System (IDS...

متن کامل

Intrusion Detection based on a Novel Hybrid Learning Approach

Information security and Intrusion Detection System (IDS) plays a critical role in the Internet. IDS is an essential tool for detecting different kinds of attacks in a network and maintaining data integrity, confidentiality and system availability against possible threats. In this paper, a hybrid approach towards achieving high performance is proposed. In fact, the important goal of this paper ...

متن کامل

Data Mining Techniques For Intrusion Detection System

Reddy et al (20) also presented a survey of various data mining techniques for intrusion detection system. Subramanian et al (21) presented the performance. Developing a Hybrid Intrusion Detection System Using Data Mining for A data mining technique called common path mining is used to automatically. The proposed hybrid technique combines data mining approaches like K Novel intrusion detection ...

متن کامل

Overview of Intrusion Detection Techniques in Database

Data is one of the most valuable assets in today's world and is used in the everyday life of every person and organization. This data stores in a database in order to restore and maintain its efficiently. Since there is a database that can be exploited by SQL injection attacks, internal threats, and unknown threats, there are always concerns about the loss or alteration of data by unauthorized ...

متن کامل

A Survey on Intrusion Detection System in Data Mining

This paper presents a survey of techniques of intrusion detection system using supervised and unsupervised learning. The techniques are categorized based upon different approaches like Statistics, Data mining, Neural Network Based and Self Organizing Maps Based approaches. The detection type is borrowed from intrusion detection as either misuse detection or anomaly detection. It provides the re...

متن کامل

A Complete Study on Intrusion Detection Using Data Mining Techniques

In recent years the security in data mining applications has become crucial in protecting public and private computing systems. Contemporary computing applications are facing numerous complex problems related to various internal or external attacks. This paper mainly focuses on a comprehensive study on Intrusion Detection systems. In modern world of security many researchers have proposed vario...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017