Download now Free registration required
Now-a-days Information Security plays an important role in Hi-tech computing world. Even though firewall is used to provide security between two different networks, it fails to care about the intranet security (security within a single network). In order to overcome the problem a model called Intrusion Detection System is used. The process of monitoring the events occurring in a computer system or network and analyzing them for sign of intrusions is known as Intrusion Detection System (IDS). In this experiment, the authors investigated Decision trees algorithm. To train the soft computing techniques they are using the Benchmark KDD cup Data set.
- Format: PDF
- Size: 121.4 KB