scholarly journals The Design and Implementation of Intrusion Detection System based on Data Mining Technology

2013 ◽  
Vol 5 (14) ◽  
pp. 3824-3829 ◽  
Author(s):  
Qinglei Zhou ◽  
Yilin Zhao
2015 ◽  
Vol 713-715 ◽  
pp. 2081-2084 ◽  
Author(s):  
Zeng Ying He

Aiming at some deficiencies of existing network intrusion detection system, the paper proposes a network intrusion detection system model based on data mining, applying data mining technology to network intrusion detection, and constructed the final test results of the system on the basis of Snort design. Experimental results demonstrate that this data mining based on cluster algorithm can effectively establish models of network normal activity and significantly accelerate intrusion detection, whilst its association analyzer can effectively unearth some new intrusion patterns from abnormal logs, and automatically construct intrusion detection rules.


2021 ◽  
pp. 1826-1839
Author(s):  
Sandeep Adhikari, Dr. Sunita Chaudhary

The exponential growth in the use of computers over networks, as well as the proliferation of applications that operate on different platforms, has drawn attention to network security. This paradigm takes advantage of security flaws in all operating systems that are both technically difficult and costly to fix. As a result, intrusion is used as a key to worldwide a computer resource's credibility, availability, and confidentiality. The Intrusion Detection System (IDS) is critical in detecting network anomalies and attacks. In this paper, the data mining principle is combined with IDS to efficiently and quickly identify important, secret data of interest to the user. The proposed algorithm addresses four issues: data classification, high levels of human interaction, lack of labeled data, and the effectiveness of distributed denial of service attacks. We're also working on a decision tree classifier that has a variety of parameters. The previous algorithm classified IDS up to 90% of the time and was not appropriate for large data sets. Our proposed algorithm was designed to accurately classify large data sets. Aside from that, we quantify a few more decision tree classifier parameters.


Sign in / Sign up

Export Citation Format

Share Document