2011
DOI: 10.2478/v10143-011-0040-3
|View full text |Cite
|
Sign up to set email alerts
|

Building an Intrusion Detection System for IT Security Based on Data Mining Techniques

Abstract: -This paper aims to research various data mining techniques applied to solve intrusion detection problems. In general, intrusion detection techniques can be divided into two major categories: misuse detection and anomaly detection. Taking into consideration effectiveness of the anomaly detection technique not only against known types of attacks (like misuse detection does by exploiting signature database) but also against new ones, it has become a topical issue in majority of data and computer security researc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2013
2013
2013
2013

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 13 publications
(19 reference statements)
0
2
0
Order By: Relevance
“…Model construction is the critical part in Intrusion Detection Systems. Modeling technology can provide quantitative methods for the analysis of data, to represent, or acquire expert knowledge, using inductive logic programming, or algorithms, so that AI, cognitive science and other research fields are afforded broader platforms for the development of IDS [4,6]. This paper presents a hybrid intelligent system for IDS problem.…”
Section: Model Constructionmentioning
confidence: 99%
See 1 more Smart Citation
“…Model construction is the critical part in Intrusion Detection Systems. Modeling technology can provide quantitative methods for the analysis of data, to represent, or acquire expert knowledge, using inductive logic programming, or algorithms, so that AI, cognitive science and other research fields are afforded broader platforms for the development of IDS [4,6]. This paper presents a hybrid intelligent system for IDS problem.…”
Section: Model Constructionmentioning
confidence: 99%
“…In recent years a vast majority of research activities in the area of anomaly detection have been focused on studying the behaviour of programs and the creation of their profiles based on system call log files [4].…”
Section: Related Workmentioning
confidence: 99%