Study of Data Mining Based Approaches For Network Intrusion Detection System
Main Article Content
Abstract
In the current era, there is ample knowledge in using Internet in social networks (such as instant messaging, video conferencing, etc.), the field of healthcare, various areas related to electronic commerce, banking and services several other fields. As computer systems based on the network plays an ever more important in modern society once they have become the target of our enemies and criminals. Therefore, we must find the best way to protect our systems. The security of a computer system is compromised during an intrusion occurs. Intrusion can be defined as “a set of actions that aim to compromise the integrity, confidentiality or availability of a resource,” for example, illegally obtain superuser privileges to attack and make out of the system (ie, Denial of Service), etc. The purpose of this document is to provide a study of some works that use data mining techniques to detect intrusions and answer some technical questions. An advance effective idea is discussed in the chapter that will detect intruders in a data storage perspective and integrate data mining and online analytical processing (OLAP) for the purpose of intrusion detection.
Downloads
Download data is not yet available.
Article Details
How to Cite
1.
Shukla N, Yadav N. Study of Data Mining Based Approaches For Network Intrusion Detection System. sms [Internet]. 25Dec.2015 [cited 8Aug.2025];7(02):93-8. Available from: https://smsjournals.com/index.php/SAMRIDDHI/article/view/1116
Section
Research Article

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.