Intrusion Detection Using Data Mining Technique

In reality it is not possible to prevent security breaches completely using the existing security technologies. The intrusion detection plays an important role in network security and information system. However, many current Intrusion Detection Systems (IDSs) are signature based systems. The signature based IDS also known as misuse detection looks for a specific signature to match, and identify an intrusion. When the signatures or patterns are provided, they can detect all known attack patterns, but there are some problems for unknown attacks. The rate of false positives is very low but these types of systems are poor at detecting new attacks, variation of known attacks or attacks that act as normal behavior.

Provided by: International Journal of Innovative Technology and Exploring Engineering (IJITEE) Topic: Networking Date Added: Mar 2013 Format: PDF

Find By Topic