International Journal of Computer Applications
With the ephemeral time every information stands a greater risk of being exposed than ever before. System's security is endangered in a blink and intrusion takes place. Keeping this in mind, the effectiveness of various data mining approaches are discussed. Some methods involved in classification and clustering are stated. Analysis of SVM classifier and K-means clustering is also presented. Intrusion Detection System (IDS) maintains the integrity of the system, monitors network traffic detecting potential hostile activities.