IJSDR
IJSDR
INTERNATIONAL JOURNAL OF SCIENTIFIC DEVELOPMENT AND RESEARCH
International Peer Reviewed & Refereed Journals, Open Access Journal
ISSN Approved Journal No: 2455-2631 | Impact factor: 8.15 | ESTD Year: 2016
open access , Peer-reviewed, and Refereed Journals, Impact factor 8.15

Issue: April 2024

Volume 9 | Issue 4

Impact factor: 8.15

Click Here For more Info

Imp Links for Author
Imp Links for Reviewer
Research Area
Subscribe IJSDR
Visitor Counter

Copyright Infringement Claims
Indexing Partner
Published Paper Details
Paper Title: REVIEW OF VARIOUS DATA MINING AND MACHINE LEARNING METHOD FOR INTRUSION DETECTION
Authors Name: Prakash Chandra , Prof. Umesh Kumar Lilhore
Unique Id: IJSDR1704047
Published In: Volume 2 Issue 4, April-2017
Abstract: Due to rapid growth and development in digital world data are easily available for attackers. Easy availability of data create loops in security, an attacker can access and modified private data of an authorized user. Data Security is a crucial and open issue for researchers. Intrusions detections systems from point of view of security policy are a second line of defense; they have a supervisory role to observe the activities of our network or hosts to identify attacks in real time. In these days,electronics attacks can cause a very destructive damage for nations which make necessary the useofcompletedsecurity policy to minimize the potential threats. IDS it is a very important element to resist against this vulnerability.KDD cup 99, N-KDD Cup and Kyoto data sets are to detect various network based IDS by using different machine learning and data mining methods. In this survey paper we are presenting review of various data mining and machine learning methods for IDS detection used in WEKA tool. Lastly in this survey we tend to explain the mostly used dataset in network security research KDDCUP 99 data sets and alsopresenta complete study of its various components. Finally we conclude our survey with few real research proposals which will be open issues for searchers.
Keywords: Intrusion Detection, Machine Learning, Network Security, WEKA
Cite Article: "REVIEW OF VARIOUS DATA MINING AND MACHINE LEARNING METHOD FOR INTRUSION DETECTION", International Journal of Science & Engineering Development Research (www.ijsdr.org), ISSN:2455-2631, Vol.2, Issue 4, page no.274 - 277, April-2017, Available :http://www.ijsdr.org/papers/IJSDR1704047.pdf
Downloads: 000337348
Publication Details: Published Paper ID: IJSDR1704047
Registration ID:170166
Published In: Volume 2 Issue 4, April-2017
DOI (Digital Object Identifier):
Page No: 274 - 277
Publisher: IJSDR | www.ijsdr.org
ISSN Number: 2455-2631

Click Here to Download This Article

Article Preview

Click here for Article Preview







Major Indexing from www.ijsdr.org
Google Scholar ResearcherID Thomson Reuters Mendeley : reference manager Academia.edu
arXiv.org : cornell university library Research Gate CiteSeerX DOAJ : Directory of Open Access Journals
DRJI Index Copernicus International Scribd DocStoc

Track Paper
Important Links
Conference Proposal
ISSN
DOI (A digital object identifier)


Providing A digital object identifier by DOI
How to GET DOI and Hard Copy Related
Open Access License Policy
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
Creative Commons License
This material is Open Knowledge
This material is Open Data
This material is Open Content
Social Media
IJSDR

Indexing Partner