Intrusion Detection System with Data Mining Approach: A Review

Article ID

R0492

Intrusion Detection System with Data Mining Approach: A Review

DR. Madjid Khalilian
DR. Madjid Khalilian university putra malaysia
Norwati Mustapha
Norwati Mustapha
DOI

Abstract

Despite of growing information technology widely, security has remained one challenging area for computers and networks. Recently many researchers have focused on intrusion detection system based on data mining techniques as an efficient strategy. The main problem in intrusion detection system is accuracy to detect new attacks therefore unsupervised methods should be applied. On the other hand, intrusion in system must be recognized in realtime, although, intrusion detection system is also helpful in off-line status for removing weaknesses of network’s security. However, data mining techniques can lead us to discover hidden information from network’s log data. In this survey, we try to clarify: first,the different problem definitions with regard to network intrusion detection generally; second, the specific difficulties encountered in this field of research; third, the varying assumptions, heuristics, and intuitions forming the basis of erent approaches; and how several prominent solutions tackle different problems.

Intrusion Detection System with Data Mining Approach: A Review

Despite of growing information technology widely, security has remained one challenging area for computers and networks. Recently many researchers have focused on intrusion detection system based on data mining techniques as an efficient strategy. The main problem in intrusion detection system is accuracy to detect new attacks therefore unsupervised methods should be applied. On the other hand, intrusion in system must be recognized in realtime, although, intrusion detection system is also helpful in off-line status for removing weaknesses of network’s security. However, data mining techniques can lead us to discover hidden information from network’s log data. In this survey, we try to clarify: first,the different problem definitions with regard to network intrusion detection generally; second, the specific difficulties encountered in this field of research; third, the varying assumptions, heuristics, and intuitions forming the basis of erent approaches; and how several prominent solutions tackle different problems.

DR. Madjid Khalilian
DR. Madjid Khalilian university putra malaysia
Norwati Mustapha
Norwati Mustapha

No Figures found in article.

DR. Madjid Khalilian. 1970. “. Unknown Journal GJCST Volume 11 (GJCST Volume 11 Issue 5): .

Download Citation

Journal Specifications
Classification
Not Found
Keywords
Article Matrices
Total Views: 20395
Total Downloads: 10877
2026 Trends
Research Identity (RIN)
Related Research
Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Intrusion Detection System with Data Mining Approach: A Review

DR. Madjid Khalilian
DR. Madjid Khalilian university putra malaysia
Norwati Mustapha
Norwati Mustapha

Research Journals