Review paper on Intrusion Detection Using Data Mining strategies

Main Article Content

srinivas l
Phaniraj Kumar T

Abstract

In Information Security, Intrusion location is the demonstration of distinguishing activities that endeavor to bargain the uprightness, classification, or accessibility of an asset. Intrusion location does not, when all is said in done, incorporate aversion of Intrusions. This paper is focusing on information mining systems that are being utilized for such purposes. Points of interest and burdens of these systems have been talked about in this paper. Present day Intrusion discovery applications confronting complex issues. These applications must be require extensible, dependable, simple to oversee, and have low upkeep cost.

Downloads

Download data is not yet available.

Article Details

Section
Articles

References

. F Zhang, An effective Feature selection approach for Network Intrusion Detection. IEEE Eigth International Conference, 2013.

Ektafa, Intrusion Detection Using Data Mining Techniquesâ€,IEEE Trans., 2010.

Zibusiso Dewa and Leandros A. Maglaras, Data Mining and Intrusion Detection Systems.