Open AccessProceedings Article
A study of Intrusion Detection using data mining
Moorthy,Sathiyabama +1 more
- pp 8-15
Reads0
Chats0
About:
This article is published in IEEE-International Conference On Advances In Engineering, Science And Management.The article was published on 2012-01-01 and is currently open access. It has received 10 citations till now. The article focuses on the topics: Intrusion detection system & Feature extraction.read more
Citations
More filters
Proceedings ArticleDOI
A new feature selection IDS based on genetic algorithm and SVM
TL;DR: This study proposes a method which can achieve more stable features in comparison with other techniques, and can reach high accuracy and low false positive rate (FPR) simultaneously, though it had earlier been achieved in earlier studies separately.
Proceedings ArticleDOI
Overview of intrusion detection using data-mining and the features selection
TL;DR: The main goal of this paper is to expose data mining techniques and approaches to improve the performance of the traditional intrusion detection system to identify known and unknown attack's patterns.
Anomaly Intrusion Detection Techniques: A Brief Review
TL;DR: The various techniques of anomaly based intrusion detection system reported in the literature have been sorted out on the parameters like their strength and weakness and direction to intrusion detection methods based on ensemble of ML techniques are given.
Journal ArticleDOI
Web Application Attacks Detection: A Survey and Classification
TL;DR: This paper presents web intrusion detection system based on detection of web vulnerabilities, also approaches to improve the web application security using intrusion detection systems and scanners based on machine learning and artificial intelligence.
Journal ArticleDOI
Integrity Model based Intrusion Detection System: A Practical Approach
TL;DR: The proposed research paper tries to propose a model for improving the optimum information Integrity by quantifying the intrinsic integrity attributes so that the data may not get compromised.