Intrusion detection using data mining

被引:2
|
作者
Puthran, Shubha [1 ]
Shah, Ketan [1 ]
机构
[1] Puthran, Shubha
[2] Shah, Ketan
来源
Puthran, Shubha (shubha.puthran@nmims.edu) | 1600年 / Inderscience Publishers卷 / 09期
关键词
Clustering algorithms - Data mining - Decision trees;
D O I
10.1504/IJCISTUDIES.2020.111036
中图分类号
学科分类号
摘要
引用
下载
收藏
页码:292 / 306
相关论文
共 50 条
  • [21] Intrusion Detection System using Stream Data Mining and Drift Detection Method
    Kumar, Manish
    Hanumanthappa, M.
    2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [22] Intelligent Network Intrusion Detection System using Data Mining Techniques
    Sultana, Amreen
    Jabbar, M. A.
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2016, : 329 - 333
  • [23] Intrusion Detection System using Fuzzy Logic and Data Mining Technique
    Chapke, Prajkta P.
    Deshmukh, Rupali R.
    ICARCSET'15: PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON ADVANCED RESEARCH IN COMPUTER SCIENCE ENGINEERING & TECHNOLOGY (ICARCSET - 2015), 2015,
  • [24] Intrusion Detection System by Using Hybrid Algorithm of Data Mining Technique
    Foroushani, Zohreh Abtahi
    Li, Yue
    PROCEEDINGS OF 2018 7TH INTERNATIONAL CONFERENCE ON SOFTWARE AND COMPUTER APPLICATIONS (ICSCA 2018), 2018, : 119 - 123
  • [25] Anomaly Based Intrusion Detection Using Data Mining and String Metrics
    Nikolova, Evgeniya
    Jecheva, Veselina
    2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, : 440 - 444
  • [26] Network Intrusion Detection System Using various data mining techniques
    DikshantGupta
    SuhaniSinghal
    Malik, Shamita
    Singh, Archana
    2016 INTERNATIONAL CONFERENCE ON RESEARCH ADVANCES IN INTEGRATED NAVIGATION SYSTEMS (RAINS), 2016,
  • [27] Investigating and evaluating behavioural profiling and intrusion detection using data mining
    Singh, H
    Furnell, S
    Lines, B
    Dowland, P
    INFORMATION ASSURANCE IN COMPUTER NETWORKS: METHODS, MODELS AND ARCHITECTURES FOR NETWORK SECURITY, PROCEEDINGS, 2001, 2052 : 153 - 158
  • [28] A NOVEL SIGNATURE SEARCHING FOR INTRUSION DETECTION SYSTEM USING DATA MINING
    Ding, Ya-Li
    Li, Lei
    Luo, Hong-Qi
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-6, 2009, : 122 - 126
  • [29] Design and Development of a Prototype Application for Intrusion Detection using Data mining
    Jaswal, Kalpana
    Kumar, Praveen
    Rawat, Seema
    2015 4TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (ICRITO) (TRENDS AND FUTURE DIRECTIONS), 2015,
  • [30] Overview of Intrusion Detection Using Data-Mining and the features selection
    El Moussaid, Nadya
    Toumanari, Ahmed
    2014 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2014, : 1269 - 1273