International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064




Downloads: 126

Research Paper | Information Technology | India | Volume 3 Issue 11, November 2014


Intrusion Detection Using Data Mining Approach

Kamble Jayshree R. | Rangdale S.P.


Abstract: Intrusion Detection is one of intelligent application in which data mining technique can be used. This paper presents data mining approach in Intrusion detection. Intrusion detection is nothing but the detection of action that attempts to compromise the system security factors such as integrity, availability of a resource, confidentiality. Intrusion detection does not involve the Intrusion prevention functionality. This paper represents the approach for expert system doing data mining embedded with Intrusion Detection System. Complete information about intrusion mechanism is required to generate the appropriate decision. This paper discusses the frame work for the data mining based IDS and architecture of Data Mining based IDS.


Keywords: Intrusion Detection System, Anomaly Detection, Misuse Detection DOS, Probing, U2R, R2L


Edition: Volume 3 Issue 11, November 2014,


Pages: 1142 - 1145

Intrusion Detection Using Data Mining Approach


How to Cite this Article?

Kamble Jayshree R., Rangdale S.P., "Intrusion Detection Using Data Mining Approach", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=2015169, Volume 3 Issue 11, November 2014, 1142 - 1145, #ijsrnet

How to Share this Article?

Enter Your Email Address




Similar Articles with Keyword 'Intrusion Detection System'

Downloads: 4

Student Project, Information Technology, India, Volume 10 Issue 12, December 2021

Pages: 695 - 698

Intrusion Detection using Machine Learning Techniques

Akshay Kaushik | Varun Goel

Share this Article

Downloads: 95

Survey Paper, Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 1479 - 1482

Analysis of NSL-KDD Dataset for Fuzzy Based Intrusion Detection System

Macdonald Mukosera [4] | Thabiso Peter Mpofu [6] | Budwell Masaiti [2]

Share this Article


Top