Systematic Literature Survey on IDS Based on Data Mining

被引:3
作者
Pushpam, C. Amali [1 ]
Jayanthi, J. Gnana [2 ]
机构
[1] Rajah Serfoji Coll, Thanjavur, Tamil Nadu, India
[2] Rajah Serfoji Coll, Dept Comp Sci, Thanjavur, Tamil Nadu, India
来源
SECOND INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGIES, ICCNCT 2019 | 2020年 / 44卷
关键词
Intrusion; Attack; Data mining; Intruders; Security; RANDOM FOREST; INTRUSION;
D O I
10.1007/978-3-030-37051-0_95
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In this digital era, the usage of internet and information grows rapidly. Every fraction of second, huge volume of data is transferred from one network to another. This information and information system are subjected to attack. It is necessary to protect this valuable information and network from intruders generally named as crackers or hackers who are threat to system security. System security is a common, current and critical problem which is a challengeable task to researchers. Intrusion Detection System (IDS) offers good solution to this problem. With aim of boost up the performance of IDS, it is integrated with data mining. Various data mining techniques in IDS, based on certain metrics like accuracy, false alarm rate, detection rate and issues of IDS have been analyzed in this paper. A total of 43 papers were reviewed in the period 2008 to 2018. It is observed that more number of articles support SVM or ANN Techniques. Also it is observed that hybrid methods produce better performance than single. This survey shows that in hybrid methods, frequently K-means or SVM technique are combined with others and gives good result.
引用
收藏
页码:850 / 860
页数:11
相关论文
共 43 条
  • [1] Abdullah A., 2017, INT J ADV RES COMPUT, V8, P316
  • [2] Agrawal S., 2017, Int. Res. J. Eng. Technol (IRJET), V4, P402
  • [3] Random Forest and Support Vector Machine based Hybrid Approach to Sentiment Analysis
    Al Amrani, Yassine
    Lazaar, Mohamed
    El Kadiri, Kamal Eddine
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING IN DATA SCIENCES (ICDS2017), 2018, 127 : 511 - 520
  • [4] [Anonymous], 2014, J. Intell. Learn. Syst. Appl., DOI DOI 10.4236/JILSA.2014.61005
  • [5] Baravati HB, 2017, INT J COMPUT SCI NET, V17, P194
  • [6] Performance Evaluation of Supervised Machine Learning Algorithms for Intrusion Detection
    Belavagi, Manjula C.
    Muniyal, Balachandra
    [J]. TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 : 117 - 123
  • [7] Chaturvedi P., 2017, INT J RECENT INNOV T, V5, P671
  • [8] Chaudhari R. R., 2017, INT J ADV RES COMPUT, V6, P114
  • [9] Chaudhari R. R., 2017, International Research Journal of Engineering and Technology (IRJET), V4, P1860
  • [10] Chauhan A., 2011, International Journal of Scientific Engineering Research, V2, P1