International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
In this modern world, computer has been used as a tool for crime. Because of this kind of hacking, companies are getting loss. By using Intrusion Detection System (IDS), the attacks can be detected and that can be corrected. The authors also check the effectiveness and ineffectiveness in finding the anomalies by considering the network data. Intrusion Detection System (IDS) provides a layer that monitors the network traffic for predefined suspicious patterns and inform about the mis-activity. In this paper, they address the clustering methods and the method for detecting attacks. Experiments performed on the KDD CUP 1999 dataset.