Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
In communication the security is an essential objective. Therefore various security systems are developed for networks, among them the IDS are an essential contribution for security. In this paper IDS technology is investigated in detail. In addition of that recent development on IDS systems is also investigated in this paper. After evaluation of previously developed methodology a new IDS system is proposed for enhancing the performance of the recently developed IDS systems. | International Journal of Computer Networks and Communications Security VOL. 2, NO. 12, DECEMBER 2014, 485–490 Available online at: www.ijcncs.org ISSN 2308-9830 A survey on Data Mining based Intrusion Detection Systems Mala Bharti Lodhi1, Vineet Richhariya2 and Mahesh Parmar3 1, 2, 3 LNCT, Department of Computer Science Engineering, RGPV University, India E-mail: 1mala141086@yahoo.co.in, 2Vineet_rich@yahoo.com ABSTRACT In communication the security is an essential objective. Therefore various security systems are developed for networks, among them the IDS are an essential contribution for security. In this paper IDS technology is investigated in detail. In addition of that recent development on IDS systems is also investigated in this paper. After evaluation of previously developed methodology a new IDS system is proposed for enhancing the performance of the recently developed IDS systems. Keywords: Network Security, IDS, Data Mining, Classification, Review. 1 method for classifying the KDD CUP 99’s datasets. INTRODUCTION Now in these days the network communication is growing continuously and adopted rapidly. The network technology having a large number of applications, this is now used for banking applications, shopping and others. Thus a significant amount of sensitive and private data is traversing through these networks. During to data transmission data is travelling through untrusted network, therefore loss of security and data is an essential concern in the network technology. The presented study provides a detailed investigation of the security aspects and their flaws. Thus in this study intrusion detection systems are learned and a new concept of intrusion system design is presented. The key objectives of the presented study involved the following work. a. Study of intrusion detection system: in this phase, intrusion detection system is studied. In addition of that their properties and standard datasets are obtained. b. Investigation of intrusion .