A SURVEY ON DIVERSE DATA MINING TECHNIQUES IN INTRUSION DETECTION SYSTEM

Authors

Dr. Ramalingam Sugumar (Professor & Head) & K. Sivasakthi
Christhu Raj College, Trichy (Affiliated to Bharathidasan University, Trichy)

Abstract

As the internet and technology have gotten universal, there has been an impressive ascent in the quantity of intrusion event. It is exceptionally basic to build up a security strategy around these frameworks. The way toward recognizing unapproved action against computer or organizations is known as Intrusion Detection. It is hard to support computer frameworks refreshed as the quantity of penetrates expands step by step. IDS screens and recognizes uncertain conditions of such frameworks. Interruption location frameworks are worked for recognizing unapproved endeavours to get to or control the computer organizations. IDS gather network information to recognize various types of malware and assaults against administrations and applications. In this paper discuss about data mining based intrusion detection system.