Intrusion detection using data mining

被引:2
|
作者
Puthran, Shubha [1 ]
Shah, Ketan [1 ]
机构
[1] Puthran, Shubha
[2] Shah, Ketan
来源
Puthran, Shubha (shubha.puthran@nmims.edu) | 1600年 / Inderscience Publishers卷 / 09期
关键词
Clustering algorithms - Data mining - Decision trees;
D O I
10.1504/IJCISTUDIES.2020.111036
中图分类号
学科分类号
摘要
引用
下载
收藏
页码:292 / 306
相关论文
共 50 条
  • [41] Applying Data Mining Techniques to Intrusion Detection
    Ng, Jonathon
    Joshi, Deepti
    Banik, Shankar M.
    2015 12TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY - NEW GENERATIONS, 2015, : 800 - 801
  • [42] Intrusion Detection Models Based on Data Mining
    Guojun Mao
    Xindong Wu
    Xuxian Jiang
    International Journal of Computational Intelligence Systems, 2012, 5 : 30 - 38
  • [43] Research on intrusion detection based on data mining
    Tong, Xiaojun
    Cui, Minggen
    Wang, Jie
    PROGRESS IN INTELLIGENCE COMPUTATION AND APPLICATIONS, PROCEEDINGS, 2007, : 444 - 447
  • [44] Integrating Intrusion Detection System and Data Mining
    Yusufovna, Sattarova Feruza
    INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS, 2008, : 256 - 259
  • [45] Intrusion scenarios detection based on data mining
    Ding, Yu-Xin
    Wang, Hai-Sen
    Liu, Qing-Wei
    PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 1293 - 1297
  • [46] Hybrid intrusion detection based on data mining
    Zhang, Lei
    Zhang, Jianqing
    Chen, Yong
    Liao, Shaowen
    2018 11TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION (ICICTA 2018), 2018, : 299 - 301
  • [47] An intrusion detection model based on data mining over data
    Mao, Yi-Min
    Yang, Lu-Ming
    Chen, Zhi-Gang
    Liu, Li-Xin
    Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and Technology), 2011, 42 (09): : 2720 - 2728
  • [48] A Modular Data Mining Architecture for Intrusion Detection Systems' Data
    Xynos, Konstantinos
    Blyth, Andrew
    PROCEEDINGS OF THE 7TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2008, : 229 - 237
  • [49] Data warehousing and data mining techniques for intrusion detection systems
    Anoop Singhal
    Sushil Jajodia
    Distributed and Parallel Databases, 2006, 20 : 149 - 166
  • [50] Using data mining to discover signatures in network-based intrusion detection
    Han, H
    Lu, XL
    Ren, LY
    2002 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-4, PROCEEDINGS, 2002, : 13 - 17