International Journal of Computer Science and Communication Networks (IJCSCN)
It is impossible for any computer system to be claimed immune to network intrusions. Since there is no perfect solution to prevent intrusions from happening, it is very important to detect them at the first moment of occurrence and take actions to minimize the possible damage. This paper presents the results of an experimental study of some common intrusion detection techniques. In particular, the authors compared the three main approaches to intrusion detection: FCC, Y-means, and UAD. This paper is to compare and find feasible clustering algorithms to achieve good performance with high efficiency while dealing with the intrusions.