2013
DOI: 10.5815/ijitcs.2013.08.08
|View full text |Cite
|
Sign up to set email alerts
|

Data Mining in Intrusion Detection: A Comparative Study of Methods, Types and Data Sets

Abstract: Abstract-In the era of info rmation and communicat ion technology, Security is an important issue. A lot of effort and finance are being invested in this sector. Intrusion detection is one of the mos t prominent fields in this area. Data min ing in network intrusion detection can automate the network intrusion detection field with a greater efficiency. This paper presents a literature survey on intrusion detection system. The research papers taken in this literature survey are published fro m 2000 to 2012. We … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
20
0
1

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 35 publications
(21 citation statements)
references
References 68 publications
(39 reference statements)
0
20
0
1
Order By: Relevance
“…Needless to remind that the application of the data mining techniques within the intrusion detection context can effectively improve the detection accuracy, the detection speed, and enhance the system's own security [2]. Thus, as an intelligent analysis task, the AnomalyAgent provides the crossroads of multi-agents systems with the clustering technique, in particular the AD-Clust algorithm.…”
Section: The Clustering Algorithm Ad-clustmentioning
confidence: 99%
“…Needless to remind that the application of the data mining techniques within the intrusion detection context can effectively improve the detection accuracy, the detection speed, and enhance the system's own security [2]. Thus, as an intelligent analysis task, the AnomalyAgent provides the crossroads of multi-agents systems with the clustering technique, in particular the AD-Clust algorithm.…”
Section: The Clustering Algorithm Ad-clustmentioning
confidence: 99%
“…Anomaly detection was interested in first priority that presented 67% [18]. S. Sharma et al, presented a centrality measurement and analysis of the social networks for tracking online community by using betweenness, closeness and degree centrality measures [19].…”
Section: Related Workmentioning
confidence: 99%
“…Intrusion detection Systems (IDSs) [38] is another way to provide system level security. IDSs add an early warning capability for the suspicious activity that mostly occurs before and during an attack.…”
Section: Related Workmentioning
confidence: 99%