Intrusion detection using data mining

被引:2
|
作者
Puthran, Shubha [1 ]
Shah, Ketan [1 ]
机构
[1] Puthran, Shubha
[2] Shah, Ketan
来源
Puthran, Shubha (shubha.puthran@nmims.edu) | 1600年 / Inderscience Publishers卷 / 09期
关键词
Clustering algorithms - Data mining - Decision trees;
D O I
10.1504/IJCISTUDIES.2020.111036
中图分类号
学科分类号
摘要
引用
下载
收藏
页码:292 / 306
相关论文
共 50 条
  • [31] Intrusion detection and identification system using data mining and forensic techniques
    Len, Fang-Yie
    Hu, Kai-Wei
    Jiang, Fuu-Cheng
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2007, 4752 : 137 - +
  • [32] Intrusion detection system based on data mining
    Zhang, Jishan
    Gan, Yong
    Bian, Zhiwei
    Fifth Wuhan International Conference on E-Business, Vols 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 1214 - 1218
  • [33] Intrusion Detection Models Based on Data Mining
    Mao, Guojun
    Wu, Xindong
    Jiang, Xuxian
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2012, 5 (01): : 30 - 38
  • [34] Combined data mining approach for intrusion detection
    Zurutuza, U.
    Uribeetxeberria, R.
    Azketa, E.
    Gil, G.
    Lizarraga, J.
    Fernandez, M.
    SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 67 - 73
  • [35] A data mining based intrusion detection model
    Sun, JH
    Jin, H
    Chen, H
    Han, ZF
    Zou, DQ
    INTELLIGENT DATA ENGINEERING AND AUTOMATED LEARNING, 2003, 2690 : 677 - 684
  • [36] Application of Data Mining Techniques in Intrusion Detection
    Li Min
    CALL OF PAPER PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING, 2008, : 1273 - 1277
  • [37] A Comparison of Data Mining Techniques for Intrusion Detection
    Naidu, R. China Appala
    Avadhani, P. S.
    2012 IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2012, : 41 - 44
  • [38] Adaptive intrusion detection: A data mining approach
    Lee, WK
    Stolfo, SJ
    Mok, KW
    ARTIFICIAL INTELLIGENCE REVIEW, 2000, 14 (06) : 533 - 567
  • [39] Intrusion detection system based on data mining
    Zhan Jinhua
    FIRST INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2007, : 402 - 405
  • [40] Adaptive Intrusion Detection: A Data Mining Approach
    Wenke Lee
    Salvatore J. Stolfo
    Kui W. Mok
    Artificial Intelligence Review, 2000, 14 : 533 - 567