2012
DOI: 10.5120/7663-0774
|View full text |Cite
|
Sign up to set email alerts
|

A Hybrid Data Mining based Intrusion Detection System for Wireless Local Area Networks

Abstract: The exponential growth in wireless network faults, vulnerabilities, and attacks make the WLAN security management a challenging research area [29]. Data mining applied to intrusion detection is an active area of research. The main reason for using data mining techniques for intrusion detection systems is due to the enormous volume of existing and newly appearing network data that require processing. Data mining follows anomaly based intrusion detection. The drawback of the anomaly based intrusion detection in … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…Next, Random Forest classifier is used for rearranging the misclassified clustered data into a new cluster. HFIDS [19] is an IDS using fuzzy logic and applied to wireless local area networks. In the latter, a misuse detection module is connected to the anomaly detection module and the overall decision is performed by fuzzy rules.…”
Section: Related Workmentioning
confidence: 99%
“…Next, Random Forest classifier is used for rearranging the misclassified clustered data into a new cluster. HFIDS [19] is an IDS using fuzzy logic and applied to wireless local area networks. In the latter, a misuse detection module is connected to the anomaly detection module and the overall decision is performed by fuzzy rules.…”
Section: Related Workmentioning
confidence: 99%
“…Onofrei et al (2010) and Moorthy and Sathiyabama (2011) introduced a light weight security mechanism based on firewall pin holing, that effectively prevents many DDoS attacks on the IMS based emergency framework. The proposed mechanism controls a firewall to generate pinholes that are necessary to effectively protect the emergency framework.…”
Section: Problem Identificationmentioning
confidence: 99%