Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Data Mining in Network Security Using Intrusion Detection System


Affiliations
1 Department of Computer Science, AJK College of Arts and Science, Coimbatore, India
     

   Subscribe/Renew Journal


This paper presents recent trends and practices in data mining to handle the rising risks and threats in the area of Network security. These applications include code detection by mining binary executable, network intrusion detection by mining network traffic, anomaly detection, cyber security and data stream mining. This paper proposes a supervised Learning based Intrusion Detection System (IDS) to identify the intruders, attackers in a network and covers the most significant advances and emerging research issues in the field of data mining in network security.

Keywords

Learning, Intrusion Detection, Anomaly Detection, Cyber Security, Stream Mining.
User
Subscription Login to verify subscription
Notifications
Font Size


  • Data Mining in Network Security Using Intrusion Detection System

Abstract Views: 309  |  PDF Views: 4

Authors

A. Meena
Department of Computer Science, AJK College of Arts and Science, Coimbatore, India
U. Sinthuja
Department of Computer Science, AJK College of Arts and Science, Coimbatore, India

Abstract


This paper presents recent trends and practices in data mining to handle the rising risks and threats in the area of Network security. These applications include code detection by mining binary executable, network intrusion detection by mining network traffic, anomaly detection, cyber security and data stream mining. This paper proposes a supervised Learning based Intrusion Detection System (IDS) to identify the intruders, attackers in a network and covers the most significant advances and emerging research issues in the field of data mining in network security.

Keywords


Learning, Intrusion Detection, Anomaly Detection, Cyber Security, Stream Mining.

References