Analysis of Intrusion Detection System in Data mining

Authors

  • Mangaiyakarasi P Department of Computer Science, MaruthuPandiyar College, Thanjavur, India

Keywords:

Data mining, Security, IDS

Abstract

It ends up being logically basic to separate interferences with cloud precedents to guarantee our business from digital psychological warfare dangers. This paper presents information digging advances planned therefore; SmartSifter (special case area engine), ChangeFinder, AccessTracer. All of them can learn quantifiable instances of logs adaptively and to perceive interferences as verifiable characteristics concerning the insightful precedents. We rapidly graph the measures of these engines and demonstrate their applications to sort out intrusion distinguishing proof, worm revelation, and impostor acknowledgment

References

[1] W. Lee, S.J. Stolfo, K.W. Mok, “A data mining framework for building intrusion detection models”, in: Proceedings of IEEE Symposium on Security and Privacy, 1999, pp. 120–132.

[2] W. Feng, Q. Zhng, G. Hu, J Xiangji Huang,” Mining network data for intrusion detection through combining SVMs with ant colony networks ”Future Generation Computer Systems,2013.

[3] T. Zhang, R. Ramakrishnan, M. Livny, “BIRCH: an efficient data clustering method for very large databases”, in: Proceedings of SIGMOD, ACM, 1996, pp. 103–114.

[4] L. Khan, M. Awad, B. Thuraisingham, “A new intrusion detection system using support vector machines and hierarchical clustering”, The VLDB Journal 16(2007) 507–521

[5] X. Xu, “Adaptive intrusion detection based on machine learning: feature extraction, classifier construction and sequential pattern prediction”, Information Assurance and Security 4 (2006) 237–246.

[6] J.X. Huang, J. Miao, Ben He, “High performance query expansion using adaptive co –training”, Information Processing & Management 49 (2) (2013) 441–453.

[7] Y. Li u, X. Yu, J.X. Huang, A.” An, Combining integrated sampling with SVM ensembles for learning from imbalanced datasets”, Information Processing &Management 47 (4) (2011) 617–631.

[8] V. Vapnik, “The Nature of Statistical Learning Theory”, Springer, 1999.

[9] Marcelloni, combining “supervised and unsupervised learning for data clustering”, Neural Computing & Applications 15 (3–4) (2006)289–297.

[10] C.-F. Tsai, Y.-F. Hsu, C.-Y. Lin, W.-Y. Lin, “Intrusion detection by machine learning: a review”, Expert Systems with Applications 36 (2009) 11994–12000.

[11] S.X. Wu, W. Banzhaf, “The use of computational intelligence in intrusion detection systems: a review”, Applied Soft Computing 10 (2010) 1–35.

Downloads

Published

2025-11-24

How to Cite

[1]
P. Mangaiyakarasi, “Analysis of Intrusion Detection System in Data mining”, Int. J. Comp. Sci. Eng., vol. 7, no. 2, pp. 121–125, Nov. 2025.