z-logo
open-access-imgOpen Access
Network Intrusion Detection using Selected Data Mining Approaches: A Review
Author(s) -
Munawara Saiyara,
Samira Samrose,
Pranab Dey,
Afsana Salauddin,
Syeda Shabnam
Publication year - 2015
Publication title -
international journal of computer applications
Language(s) - English
Resource type - Journals
ISSN - 0975-8887
DOI - 10.5120/ijca2015907572
Subject(s) - computer science , intrusion detection system , data mining , intrusion , data science , geology , geochemistry
Due to the rapid progress in network technologies, easy availability of the internet and lower cost of mobile devices with wireless network connection facility, the number of internet users is increasing at an exponential rate now-a-days, so does the number of intrusion. Despite the implausible advancement in Information Technology, Intrusion Detection has remained as one of the biggest challenges encountered by network security specialists. Data mining can play a vital role in addressing this issue. In this paper, some selected data mining algorithms available for Network Intrusion Detection have been reviewed, such asSupport Vector Machine, KNearest Neighbor, Naïve Bayesian Classifier, Decision tree Algorithm (C4.5), Genetic Algorithm, Logistic Regression, Artificial Neural network, K-means clustering, EM algorithm, Fuzzy Logic and Hidden Markov Chain; along with addressing the advantages and disadvantages of each of them. General Terms Network Security, Data Mining Algorithms

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom