Title :
A study of Intrusion Detection using data mining
Author :
Moorthy, M. ; Sathiyabama, S.
Author_Institution :
Muthayammal Eng. Coll., Rasipuram, India
Abstract :
Every enterprise wants to protect their data from both the internal and external attackers. In this initiative firewall, encryption, and authentication serve as the first line of defense. And Intrusion Detection serves as the second line of defense. IDS may use either anomaly based approach or misuse based approach. Traditional IDS were making use of misuse based approach. The drawback of misuse based approach is that it cannot detect new type of attacks. Hence anomaly based intrusion detection were used and it is capable of detecting unknown attacks also. Anomaly based intrusion detection makes extensive use of data mining because of the advantage it provides. In this paper we try to explore the features of intrusion detection based on data mining.
Keywords :
authorisation; cryptography; data mining; message authentication; IDS; anomaly based approach; anomaly based intrusion detection; authentication; data mining; encryption; firewall; misuse based approach; Analytical models; Computers; Data mining; Feature extraction; Monitoring; Protocols; Security; Data Mining; Intrusion Detection; Knowledge Discovery Database; Patterns;
Conference_Titel :
Advances in Engineering, Science and Management (ICAESM), 2012 International Conference on
Conference_Location :
Nagapattinam, Tamil Nadu
Print_ISBN :
978-1-4673-0213-5