DocumentCode
3545149
Title
A comparison of data mining techniques for intrusion detection
Author
Naidu, R. China Appala ; Avadhani, P.S.
Author_Institution
Dept. of CS & SE, Andhra Univ., Visakhapatnam, India
fYear
2012
fDate
23-25 Aug. 2012
Firstpage
41
Lastpage
44
Abstract
The Expositional increase in the traffic across networks has necessitated the need to detect unauthorized access. In this sense Intrusion Detection has become one of the major research areas In this paper three data mining techniques namely C5.0 Decision Tree, Ripper Rule and Support Vector Machines are studied and compared for the efficiency in detecting the Intrusion, It is found that the C5.0 Decision Tree is efficient than the other two. The data mining tool clementine is used for evaluating this on the KDD99 dataset. The results are also given in this paper.
Keywords
authorisation; computer network security; data mining; decision trees; support vector machines; C5.0 decision tree; KDD99 dataset; data mining techniques; data mining tool clementine; intrusion detection; networks traffic; ripper rule; support vector machines; unauthorized access detection; Data mining; Databases; Electronic publishing; Information services; Internet; Probes; Support vector machines; Decision Tree; Intrusion Detection system; Ripper Rule; Support Vector Machines;
fLanguage
English
Publisher
ieee
Conference_Titel
Advanced Communication Control and Computing Technologies (ICACCCT), 2012 IEEE International Conference on
Conference_Location
Ramanathapuram
Print_ISBN
978-1-4673-2045-0
Type
conf
DOI
10.1109/ICACCCT.2012.6320731
Filename
6320731
Link To Document