International Journal of Computer Applications
In recent years, network based services and network based attacks have grown significantly. The network based attacks can also be considered as some kind of intrusion. Intrusion can be defined as "Any set of actions that attempt to compromise the integrity, confidentiality or availability of a resource". For controlling intrusion, intrusion detection systems are employed. The three important characteristics of intrusion detection systems are accuracy, extensibility and adaptability. The attacks generally change their types; so the authors need to update the detection rules to notice new attacks. Several techniques such as data mining, statistics, and genetic algorithm have been used for intrusion detection. Most recently, the data mining techniques have been used to mine the normal pattern from the audit data.