International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 126

Research Paper | Information Technology | India | Volume 3 Issue 11, November 2014


Intrusion Detection Using Data Mining Approach

Kamble Jayshree R., Rangdale S.P.


Abstract: Intrusion Detection is one of intelligent application in which data mining technique can be used. This paper presents data mining approach in Intrusion detection. Intrusion detection is nothing but the detection of action that attempts to compromise the system security factors such as integrity, availability of a resource, confidentiality. Intrusion detection does not involve the Intrusion prevention functionality. This paper represents the approach for expert system doing data mining embedded with Intrusion Detection System. Complete information about intrusion mechanism is required to generate the appropriate decision. This paper discusses the frame work for the data mining based IDS and architecture of Data Mining based IDS.


Keywords: Intrusion Detection System, Anomaly Detection, Misuse Detection DOS, Probing, U2R, R2L


Edition: Volume 3 Issue 11, November 2014,


Pages: 1142 - 1145


How to Cite this Article?

Kamble Jayshree R., Rangdale S.P., "Intrusion Detection Using Data Mining Approach", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=2015169, Volume 3 Issue 11, November 2014, 1142 - 1145

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Intrusion Detection System'

Downloads: 95

Survey Paper, Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 1479 - 1482

Analysis of NSL-KDD Dataset for Fuzzy Based Intrusion Detection System

Macdonald Mukosera, Thabiso Peter Mpofu, Budwell Masaiti

Share this Article

Downloads: 112

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 1127 - 1130

Analysis and Data Retrieval by Filtering Packets in High Speed Routers

Indumathi, K. Kumar

Share this Article

Similar Articles with Keyword 'Anomaly Detection'

Downloads: 114

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1576 - 1580

Intrusion Detection in Wireless Network Using Fuzzy Rules

Ketaki P. Bhusari, Swati G. Kale

Share this Article

Downloads: 141

Research Paper, Information Technology, Kenya, Volume 7 Issue 3, March 2018

Pages: 1355 - 1362

Development of a Hybrid Intrusion Detection System for Security Analysis at the IP Layer

Arphaxad Kioko Muia

Share this Article

Similar Articles with Keyword 'Intrusion'

Downloads: 95

Survey Paper, Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 1479 - 1482

Analysis of NSL-KDD Dataset for Fuzzy Based Intrusion Detection System

Macdonald Mukosera, Thabiso Peter Mpofu, Budwell Masaiti

Share this Article

Downloads: 103

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 2734 - 2737

Detection of Outliers Using Hybrid Algorithm on Categorical Datasets

Rachana P. Jakkulwar, Prof. R. A. Fadnavis

Share this Article

Similar Articles with Keyword 'Detection'

Downloads: 136

Research Paper, Information Technology, India, Volume 4 Issue 11, November 2015

Pages: 24 - 27

An Approach for Canny Edge Detection Algorithm on Face Recognition

A. D. Chitra, Dr. P. Ponmuthuramalingam

Share this Article

Downloads: 95

Survey Paper, Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 1479 - 1482

Analysis of NSL-KDD Dataset for Fuzzy Based Intrusion Detection System

Macdonald Mukosera, Thabiso Peter Mpofu, Budwell Masaiti

Share this Article

Similar Articles with Keyword 'System'

Downloads: 4 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 10 Issue 10, October 2021

Pages: 955 - 961

Fake Text Identification using Feature Extraction

Peketi Yamini, Dr. A. M. Sowjanya

Share this Article

Downloads: 7 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 307 - 310

CCTV Cameras Hacking and Prevention Techniques

Preeti Rana

Share this Article

Similar Articles with Keyword 'Anomaly'

Downloads: 114

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1576 - 1580

Intrusion Detection in Wireless Network Using Fuzzy Rules

Ketaki P. Bhusari, Swati G. Kale

Share this Article

Downloads: 116

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1990 - 1993

Advanced Persistent Threat Detection System

Hanu Prasannan, Dharani.J

Share this Article
Top