Intrusion detection system with data mining approach: a review
Despite of growing information technology widely, security has remained one challenging area for computers and networks. Recently many researchers have focused on intrusion detection system based on data mining techniques as an efficient strategy. The main problem in intrusion detection system is a...
| Main Authors: | Khalilian, Majdid, Mustapha, Norwati, Sulaiman, Md. Nasir, Mamat, Ali |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Global Journals
2011
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/18586/ http://psasir.upm.edu.my/id/eprint/18586/1/Intrusion%20detection%20system%20with%20data%20mining%20approach.pdf |
Similar Items
Data stream clustering by divide and conquer approach based on vector model
by: Khalilian, Madjid, et al.
Published: (2016)
by: Khalilian, Madjid, et al.
Published: (2016)
Different aspects of data stream clustering.
by: Khalilian, Madjid, et al.
Published: (2013)
by: Khalilian, Madjid, et al.
Published: (2013)
A novel Intrusion Detection System by using intelligent data mining in WEKA environment
by: Mohammed, Muamer N., et al.
Published: (2011)
by: Mohammed, Muamer N., et al.
Published: (2011)
Network intrusions classification using data mining approaches
by: Slamet, Slamet, et al.
Published: (2021)
by: Slamet, Slamet, et al.
Published: (2021)
A web usage mining approach based on LCS algorithm in online predicting recommendation systems
by: Jalali, Mehrdad, et al.
Published: (2008)
by: Jalali, Mehrdad, et al.
Published: (2008)
Immune System Approaches to Intrusion Detection - A Review
by: Kim, Jungwon, et al.
Published: (2007)
by: Kim, Jungwon, et al.
Published: (2007)
'Immune System Approaches to Intrusion Detection - A Review'
by: Aickelin, Uwe, et al.
Published: (2004)
by: Aickelin, Uwe, et al.
Published: (2004)
Immune System Approaches to Intrusion Detection - A Review
by: Kim, Jungwon, et al.
Published: (2007)
by: Kim, Jungwon, et al.
Published: (2007)
'Immune System Approaches to Intrusion Detection - A Review'
by: Aickelin, Uwe, et al.
Published: (2004)
by: Aickelin, Uwe, et al.
Published: (2004)
A new clustering approach based on graph partitioning for navigation patterns mining
by: Jalali, Mehrdad, et al.
Published: (2008)
by: Jalali, Mehrdad, et al.
Published: (2008)
Improving anomalous rare attack detection rate for intrusion detection system using support vector machine and genetic programming
by: Mohd Pozi, Muhammad Syafiq, et al.
Published: (2016)
by: Mohd Pozi, Muhammad Syafiq, et al.
Published: (2016)
Web user navigation pattern mining approach based on graph partitioning algorithm.
by: Jalali, Mehrdad, et al.
Published: (2008)
by: Jalali, Mehrdad, et al.
Published: (2008)
Effective mining on large databases for intrusion detection
by: Adinehnia, Reza, et al.
Published: (2014)
by: Adinehnia, Reza, et al.
Published: (2014)
Signature-based anomaly intrusion detection using integrated data mining classifiers
by: Yassin, Warusia, et al.
Published: (2014)
by: Yassin, Warusia, et al.
Published: (2014)
A Review on Soft Computing Technique in Intrusion Detection System
by: Sulaiman, Noor Suhana, et al.
Published: (2012)
by: Sulaiman, Noor Suhana, et al.
Published: (2012)
Review on Intrusion Detection System Based on The Goal of The Detection System
by: Khaleel, M. K., et al.
Published: (2018)
by: Khaleel, M. K., et al.
Published: (2018)
Review on intrusion detection system based on the goal of the detection system
by: Khaleel, Mohammad Khamees, et al.
Published: (2018)
by: Khaleel, Mohammad Khamees, et al.
Published: (2018)
Intrusion detection system in secure shell traffic in cloud environment
by: Barati, Mehdi, et al.
Published: (2014)
by: Barati, Mehdi, et al.
Published: (2014)
A novel approach for handling missing data to enhance network intrusion detection system
by: Tahir, Mahjabeen, et al.
Published: (2025)
by: Tahir, Mahjabeen, et al.
Published: (2025)
Artificial Neural Network Approaches to Intrusion Detection: A Review
Published: (2009)
Published: (2009)
Artificial Neural Network Approaches to Intrusion Detection: A Review
by: Ahmad, Iftikhar
Published: (2009)
by: Ahmad, Iftikhar
Published: (2009)
Artificial Neural Network Approaches to Intrusion Detection: A Review
by: Ahmad, iftikhar, et al.
Published: (2009)
by: Ahmad, iftikhar, et al.
Published: (2009)
Artificial Neural Network Approaches to Intrusion Detection: A Review
by: I., Ahmad, et al.
Published: (2010)
by: I., Ahmad, et al.
Published: (2010)
Scalable approach for mining association rules from structured XML data
by: Abazeed, Ashraf Riad, et al.
Published: (2009)
by: Abazeed, Ashraf Riad, et al.
Published: (2009)
A K-Means and Naive Bayes learning approach for better intrusion detection
by: Muda, Zaiton, et al.
Published: (2011)
by: Muda, Zaiton, et al.
Published: (2011)
A numerical method for frequent pattern mining
by: Mustapha, Norwati, et al.
Published: (2009)
by: Mustapha, Norwati, et al.
Published: (2009)
Overcoming the challenges of data lack, leakage, and dimensionality in intrusion detection systems: a comprehensive review
by: Abdullah, Azizol, et al.
Published: (2024)
by: Abdullah, Azizol, et al.
Published: (2024)
Intrusion-detection system based on hybrid models: review paper
by: Badran, Mohammed Falih, et al.
Published: (2020)
by: Badran, Mohammed Falih, et al.
Published: (2020)
comparative Analysis of Intrusion Detection Approaches
by: I., Ahmad, et al.
Published: (2010)
by: I., Ahmad, et al.
Published: (2010)
A new method for mining maximal frequent itemsets
by: Nadimi-Shahraki, Mohammad-Hossein, et al.
Published: (2008)
by: Nadimi-Shahraki, Mohammad-Hossein, et al.
Published: (2008)
A New Approach Based On Honeybee Guarding
System To Improve Intrusion Detection System
by: Ahmed Ali, Ghassan
Published: (2011)
by: Ahmed Ali, Ghassan
Published: (2011)
A new approach based on honeybee guarding system to improve intrusion detection system.
by: Ahmed Ali, Ghassan
Published: (2011)
by: Ahmed Ali, Ghassan
Published: (2011)
Time Based Intrusion Detection on Fast Attack for
Network Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
KM-NEU: an efficient hybrid approach for intrusion detection system
by: Lisehroodi, Mazyar Mohammadi, et al.
Published: (2014)
by: Lisehroodi, Mazyar Mohammadi, et al.
Published: (2014)
Event correlation, extra information and merged policies approaches for integrating intrusion detection and access control systems.
by: Halboob, Waleed, et al.
Published: (2013)
by: Halboob, Waleed, et al.
Published: (2013)
Efficient prime-based method for interactive mining of frequent patterns.
by: Mohammad Hossein, Nadimi Shahraki, et al.
Published: (2011)
by: Mohammad Hossein, Nadimi Shahraki, et al.
Published: (2011)
A Review on feature selection and ensemble techniques for intrusion detection system
by: Torabi, Majid, et al.
Published: (2021)
by: Torabi, Majid, et al.
Published: (2021)
A survey of anomaly detection using data mining methods for hypertext transfer protocol web services
by: Kakavand, Mohsen, et al.
Published: (2015)
by: Kakavand, Mohsen, et al.
Published: (2015)
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
by: Hadi, Ahmed Adnan
Published: (2022)
by: Hadi, Ahmed Adnan
Published: (2022)
Mining web navigation profiles for recommendation systems
by: AlMurtadha, Yahya M., et al.
Published: (2010)
by: AlMurtadha, Yahya M., et al.
Published: (2010)
Similar Items
-
Data stream clustering by divide and conquer approach based on vector model
by: Khalilian, Madjid, et al.
Published: (2016) -
Different aspects of data stream clustering.
by: Khalilian, Madjid, et al.
Published: (2013) -
A novel Intrusion Detection System by using intelligent data mining in WEKA environment
by: Mohammed, Muamer N., et al.
Published: (2011) -
Network intrusions classification using data mining approaches
by: Slamet, Slamet, et al.
Published: (2021) -
A web usage mining approach based on LCS algorithm in online predicting recommendation systems
by: Jalali, Mehrdad, et al.
Published: (2008)