CEIS 2020
DOI: 10.7176/ceis/11-1-02
|View full text |Cite
|
Sign up to set email alerts
|

A Review on Various Methods of Intrusion Detection System

Abstract: Detection of Intrusion is an essential expertise business segment as well as a dynamic area of study and expansion caused by its requirement. Modern day intrusion detection systems still have these limitations of time sensitivity. The main requirement is to develop a system which is able of handling large volume of network data to detect attacks more accurately and proactively. Research conducted by on the KDDCUP99 dataset resulted in a various set of attributes for each of the four major attack types. Without… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…Due to the need to handle a large amount of network traffic, different data mining techniques (such as clustering, classification, and association rules) are very useful for analyzing network traffic. The application of association rule technology to design an effective intrusion detection system and effectively identify known and unknown attack patterns is an important research topic [24,25].…”
Section: The Association Rules Mining For Errors Detectionsmentioning
confidence: 99%
“…Due to the need to handle a large amount of network traffic, different data mining techniques (such as clustering, classification, and association rules) are very useful for analyzing network traffic. The application of association rule technology to design an effective intrusion detection system and effectively identify known and unknown attack patterns is an important research topic [24,25].…”
Section: The Association Rules Mining For Errors Detectionsmentioning
confidence: 99%