作者
Chandrashekhar Azad, Vijay Kumar Jha
发表日期
2013/7/1
来源
Journal of IJITCS
卷号
5
期号
8
页码范围
75-90
简介
In the era of information and communication technology, Security is an important issue. A lot of effort and finance are being invested in this sector. Intrusion detection is one of the most prominent fields in this area. Data mining in network intrusion detection can automate the network intrusion detection field with a greater efficiency. This paper presents a literature survey on intrusion detection system. The research papers taken in this literature survey are published from 2000 to 2012. We can see that almost 67% of the research papers are focused on anomaly detection, 23% on both anomaly and misuse detection and 10% on misuse detection. In this literature survey statistics shows that 42% KDD cup dataset, 20% DARPA dataset and 38% other datasets are used by the different researchers for testing the effectiveness of their proposed method for misuse detection, anomaly detection or both.
引用总数
2014201520162017201820192020202120222023202445559583812