2014
DOI: 10.1016/j.eij.2013.10.003
|View full text |Cite
|
Sign up to set email alerts
|

Effective approach toward Intrusion Detection System using data mining techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
66
0
1

Year Published

2014
2014
2022
2022

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 149 publications
(67 citation statements)
references
References 12 publications
0
66
0
1
Order By: Relevance
“…It was useful to detect intruder in High accuracy rate, Drawback of this approach is cannot processing large dataset. Efficient accession toward Intrusion Detection System using the technique of data mining [2] used Hybrid PSO with C4.5, SNORT with ALADLERAD, SVM and HOPERAA approaches to detect Intruders. Advantage of this approach is the detection of the intruder in high accuracy rate.…”
Section: Literature Reviewmentioning
confidence: 99%
“…It was useful to detect intruder in High accuracy rate, Drawback of this approach is cannot processing large dataset. Efficient accession toward Intrusion Detection System using the technique of data mining [2] used Hybrid PSO with C4.5, SNORT with ALADLERAD, SVM and HOPERAA approaches to detect Intruders. Advantage of this approach is the detection of the intruder in high accuracy rate.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Therefore, instead of training the model with only labeled data, we incorporate the unlabelled data before active learning starts. G.V.Nadiammai, S.Krishnaveni, M. Hemalatha [6] have been referred to in order to understand the use different data mining techniques in order to implement an intrusion detection system. In this paper, they are provided with a summary of the current research directions in detecting such attacks using collaborative intrusion detection systems (CIDSs).…”
Section: Related Workmentioning
confidence: 99%
“…The classification techniques proposed by Nadiammai et al [15] were used to predict the severity of attacks over the network. A comparison is done with zero R classifier, Decision …”
Section: Related Workmentioning
confidence: 99%