International Journal for Innovative Research in Science and Technology (IJIRST)
For identifying the various attacks involved in a particular network, intrusion detection system is used. The role of Intrusion Detection System (IDS) is identified and prevent the malicious or un-authorized user to access the system. The data present on web or other data on the system or the data on a network of systems have many complicated and structural relations. To uniquely and properly identify the intrusion in a network it is necessary to understand the structural relationship between the data types and many algorithms based for clustering data neglect the relation among the individual data types.