[PDF][PDF] An approach for efficient intrusion detection for KDD dataset: a survey

N Sharma, B Gaur - International Journal of Advanced Technology …, 2016 - academia.edu
Identifying possible attacks on the network system is a challenging task. There is several
research works are processed in this direction, but the need of improvement is always …

[PDF][PDF] A study of intrusion detection system using efficient data mining techniques

P Rutravigneshwaran - International Journal of Scientific Research in …, 2017 - ijsrnsc.org
IDS is a software consequence monitors the humiliation or behavior plus investigate any
immoral operation suggest itself. Fantastic increase and tradition of internet raises concerns …

[PDF][PDF] Intrusion detection and attack classification using back-propagation neural network

R Gaidhane, C Vaidya, M Raghuwanshi - Int. J. Eng. Res, 2014 - academia.edu
Intrusion detection is a process that analyzes abnormalities in system or network activities.
For security purpose it is necessary to identify malicious events correctly. Majority of …

[PDF][PDF] A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection

S Revathi, A Malathi - … of Engineering Research & Technology (IJERT …, 2013 - academia.edu
During the last decade the analysis of intrusion detection has become very important, the
researcher focuses on various dataset to improve system accuracy and to reduce false …

[PDF][PDF] Data mining in intrusion detection: a comparative study of methods, types and data sets

C Azad, VK Jha - Journal of IJITCS, 2013 - researchgate.net
In the era of information and communication technology, Security is an important issue. A lot
of effort and finance are being invested in this sector. Intrusion detection is one of the most …

Machine learning methods for network intrusion detection

M Alkasassbeh, M Almseidin - arXiv preprint arXiv:1809.02610, 2018 - arxiv.org
Network security engineers work to keep services available all the time by handling intruder
attacks. Intrusion Detection System (IDS) is one of the obtainable mechanisms that is used to …

[PDF][PDF] Review of various intrusion detection methods for training data sets

NS Khan, U Lilhore - International Journal of Modern Trends in …, 2016 - researchgate.net
In the field of Information technology security plays a vital role. Unauthorized entries or any
anomalies in system are known as intrusion and detection of these anomalies are known as …

[PDF][PDF] A comprehensive analysis and study in intrusion detection system using data mining techniques

GV Nadiammai, S Krishnaveni… - International Journal of …, 2011 - Citeseer
Data mining refers to extracting knowledge from large amounts of data. Most of the current
systems are weak at detecting attacks without generating false alarms. Intrusion detection …

[引用][C] Intrusion detection in KDD99 dataset: A review

MJ Gowadiya, A Jain - Int. J. Sci. Eng. Res., 2015

[引用][C] Network intrusion detection using data mining technique

S Sivaranjani, MR Pathak - International Journal of Advanced Research in …, 2018