2016
DOI: 10.19101/ijatee.2016.318006
|View full text |Cite
|
Sign up to set email alerts
|

An approach for efficient intrusion detection for KDD dataset: A survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
3
0

Year Published

2016
2016
2018
2018

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 20 publications
0
3
0
Order By: Relevance
“…The major challenge field of network intrusion detection is to shape the area of intrusion and to reason on the model. Knowledge engineering approach and data mining approach [6] are the basic flavors of designing a domain model in IDS. All the people who are experts in that domain in along with one or more knowledge engineers and recognize the relations connecting domain variables by general manual approach.…”
Section: Introductionmentioning
confidence: 99%
“…The major challenge field of network intrusion detection is to shape the area of intrusion and to reason on the model. Knowledge engineering approach and data mining approach [6] are the basic flavors of designing a domain model in IDS. All the people who are experts in that domain in along with one or more knowledge engineers and recognize the relations connecting domain variables by general manual approach.…”
Section: Introductionmentioning
confidence: 99%
“…In this paper we have mainly focused on data mining and evolutionary algorithm based detection. It is the technique of pernicious assaults from the system and framework when it is as of now correspondence or expelling data in the steady condition [2,3]. Since its creation, interference recognizable proof has been one of the key parts in achieving information security.…”
Section: Introductionmentioning
confidence: 99%
“…Their IDS used a learning algorithm based on the SVM and a detection technique based on the attack signatures and their combined model of IDS achieved a higher rate of intrusion detection almost 98% with a number very reduces false alarms near 2%. N. Sharma et al [4] have observed several research works and they have compared the resulting discussions by their techniques. This paper provided a direction in the face of Intrusion detection improvement and suggested just like "The detection approach can be better at detecting R2L and U2R attacks more efficiently as well as anomaly detection approach, which is better at detecting attacks at the absence of match signatures as provided in the misuse rule files", "Hybridization of Association and Optimization can provide better detection.…”
mentioning
confidence: 99%