A Comprehensive Survey on Methods Implemented For Intruder Detection System
Keywords:
Intruder Detection System, Data Mining, Kddcup99Abstract
Intrusion recognition is the act of discovering undesirable visitors on a system or a system. An IDS can be a piece of set up software or a physical equipment that watches system visitors in order to identify undesirable action and activities such as unlawful and harmful visitors, visitors that goes against security plan, and visitors that goes against appropriate use policies. Intruder detection system can be implemented using various data mining approaches. This paper summarizes intrusion motives and some of the methods used and implemented for intrusion detection system. This paper also reviewed about processing environment and type of data required for evaluation of Intruder detection system.
References
Asmaa shaker,Ashroor 2011 International conference on Future Information Technology IPCSIT vol.13 (2011) " (2011) IACSIT Press, Singapore.
Singh, S. and S. Kandula, "Argus - a distributed network-intrusion detection system," Undergraduate Thesis, Indian Institute of Technology, May 2001.
Jiawei Han and Micheline Kamber Data Mining Concepts and Techniques Second Edition Morgan Kauffman Publishers ,2006
Shaik Akbar, Dr.K. Nageswara Rao, Dr.J.A. Chandulal IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.8, August 2011pp 138-144
Mrutyunjaya Panda, Manas Ranjan Patra IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.12, December 2007 pp 258- 263
P.Jenson, "Bayesian networks and decision graphs", Springer, New-york, USA, 2001.
Srinivas Mukkamala, Guadalupe Janoski, Andrew Sung 0-7803-7278-6/02 "2002 IEEE
Nani Yasmin1, Anto Satriyo Nugroho2, Harya Widiputra3," Optimized Sampling with Clustering Approach for Large Intrusion Detection Data", International Conference on Rural Information and Communication Technology 2009 Pp.56-60
Yu Guan and Ali A. Ghorbani, Nabil Belacel,"Y-Mean: A Clustering method For Intrusion Detection", 1CCECE 2003, pp.1-4
Fangfei Weng, Qingshan Jiang, Liang Shi, and Nannan Wu,"An Intrusion Detection System Based on the Clustering Ensemble", IEEE International workshop on 16-18 April 2007,pp.121 " 124
Kusum kumara Bharati,Sanyam Shukla, Swetha Jain Special Issue of IJCCT Vol.1 Issue 2, 3, 4; 2010 for International Conference [ACCTA-2010], 3-5 August 2010
Wenkee Lee, Salvatore J. Stolfo, Kui W. Mok c 2000 Kluwer Academic Publishers. Printed in Netherlands.
Rahimeh Rouhi , Farshid Keynia, Mehran Amiri Journal of Computer Sciences and Applications, 2013, Vol. 1, No. 3, 33-38
Shengi YiJiang,Xiaoyu Song, Hui Wang, Jian-Jun Han,Qing-Hua Li Science direct " 2005 Elsevier pp 802-810
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
