Download now Free registration required
Intrusion Detection System is used to detect suspicious activities is one form of defense. However, the sheer size of the network logs makes human log analysis intractable. Furthermore, traditional intrusion detection methods based on pattern matching techniques cannot cope with the need for faster speed to manually update those patterns. Anomaly detection is used as a part of the intrusion detection system, which in turn use certain data mining techniques. Data mining techniques can be applied to the network data to detect possible intrusions. The foremost step in application of data mining techniques is the selection of appropriate features from the data.
- Format: PDF
- Size: 895.9 KB