Title of article :
Intrusion Detection System Methodologies Based on Data Analysis
Author/Authors :
Shaik Akbar، نويسنده , , K.Nageswara Rao، نويسنده , , J.A.Chandulal، نويسنده ,
Issue Information :
روزنامه با شماره پیاپی سال 2010
Pages :
11
From page :
10
To page :
20
Abstract :
With the rapidly growing and wide spread use of computer networks the number of new threats has grown extensively. Intrusion and detection system can only identifying and protecting the attacks successfully. In this paper we focuses on detailed study of different types of attacks using in KDD99CUP Data Set and classification of IDS are also presented. They are Anomaly Detection System, Misuse Detection Systems. Different Data Analysis Methodologies also explained for IDS. To identify eleven data computing techniques associated with IDS are divided groups into categories. Some of those methods are based on computation such as Fuzzy logic and Bayesian networks, some are Artificial Intelligence such as Expert Systems, agents and neural networks some other are biological concepts such as Genetics and Immune systems.
Keywords :
IDS , KDD Data Set , Anomaly Detection System , Data computing Techniques , Misuse detection
Journal title :
International Journal of Computer Applications
Serial Year :
2010
Journal title :
International Journal of Computer Applications
Record number :
659944
Link To Document :
بازگشت