Analysis of Intrusion Detection System in Data mining
Keywords:
Data mining, Security, IDSAbstract
It ends up being logically basic to separate interferences with cloud precedents to guarantee our business from digital psychological warfare dangers. This paper presents information digging advances planned therefore; SmartSifter (special case area engine), ChangeFinder, AccessTracer. All of them can learn quantifiable instances of logs adaptively and to perceive interferences as verifiable characteristics concerning the insightful precedents. We rapidly graph the measures of these engines and demonstrate their applications to sort out intrusion distinguishing proof, worm revelation, and impostor acknowledgment
References
[1] W. Lee, S.J. Stolfo, K.W. Mok, “A data mining framework for building intrusion detection models”, in: Proceedings of IEEE Symposium on Security and Privacy, 1999, pp. 120–132.
[2] W. Feng, Q. Zhng, G. Hu, J Xiangji Huang,” Mining network data for intrusion detection through combining SVMs with ant colony networks ”Future Generation Computer Systems,2013.
[3] T. Zhang, R. Ramakrishnan, M. Livny, “BIRCH: an efficient data clustering method for very large databases”, in: Proceedings of SIGMOD, ACM, 1996, pp. 103–114.
[4] L. Khan, M. Awad, B. Thuraisingham, “A new intrusion detection system using support vector machines and hierarchical clustering”, The VLDB Journal 16(2007) 507–521
[5] X. Xu, “Adaptive intrusion detection based on machine learning: feature extraction, classifier construction and sequential pattern prediction”, Information Assurance and Security 4 (2006) 237–246.
[6] J.X. Huang, J. Miao, Ben He, “High performance query expansion using adaptive co –training”, Information Processing & Management 49 (2) (2013) 441–453.
[7] Y. Li u, X. Yu, J.X. Huang, A.” An, Combining integrated sampling with SVM ensembles for learning from imbalanced datasets”, Information Processing &Management 47 (4) (2011) 617–631.
[8] V. Vapnik, “The Nature of Statistical Learning Theory”, Springer, 1999.
[9] Marcelloni, combining “supervised and unsupervised learning for data clustering”, Neural Computing & Applications 15 (3–4) (2006)289–297.
[10] C.-F. Tsai, Y.-F. Hsu, C.-Y. Lin, W.-Y. Lin, “Intrusion detection by machine learning: a review”, Expert Systems with Applications 36 (2009) 11994–12000.
[11] S.X. Wu, W. Banzhaf, “The use of computational intelligence in intrusion detection systems: a review”, Applied Soft Computing 10 (2010) 1–35.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
