DocumentCode :
3575235
Title :
Intrusion detection using Data Mining
Author :
Khatri, Sunil Kumar
Author_Institution :
AIIT, Amity Univ. Uttar Pradesh, Noida, India
fYear :
2014
Firstpage :
1
Lastpage :
2
Abstract :
Intrusions are the activities that violate the security policy of system. Intrusion Detection is the process used to identify intrusions. An intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station. Based on the sources of the audit information used by each Intrusion Detection System (IDS), the IDSs may be classified into: · Host-based IDS: Get audit data from host audit trails. Detect attacks against a single host · Distributed IDS: Gather audit data from multiple hosts and possibly the network that connects the hosts. Detect attacks involving multiple hosts · Network-Based IDS: Use network traffic as the audit data source, relieving the burden on the hosts that usually provide normal computing services. Detect attacks from network.
Keywords :
data mining; security of data; audit data source; audit information; data mining; distributed IDS; host audit trails; host-based IDS; intrusion detection system; malicious activities; management station; network traffic; network-based IDS; policy violations; security policy; software application; Abstracts;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
IT in Business, Industry and Government (CSIBIG), 2014 Conference on
Print_ISBN :
978-1-4799-3063-0
Type :
conf
DOI :
10.1109/CSIBIG.2014.7056926
Filename :
7056926
Link To Document :
بازگشت