• The Role of Data Mining Techniques in Network Intrusion Detection System

Gajanan D. Kurundkar*, Quadri M. N., Nitin A. Naik

Abstract


Now a days it’s becoming an important task to maintain security for computer system and the data contain in it. Security becomes an important task for everyone, In Information Security; intrusion detection is the process of detecting illegal actions or misuse of user for confidentiality, the process of detecting such kind of activity of unauthorized user. This paper try to focused on data mining techniques that are being used for detecting intruder by using such purposes. In conclusion we near by a new idea on how data mining can support for IDS detection.

Keywords


Data mining, Security, Intruder, Confidentiality, unauthorized

Full Text:

PDF


Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
© 2010-2022 International Journal of Mathematical Archive (IJMA)
Copyright Agreement & Authorship Responsibility
Web Counter
https://journals.uol.edu.pk/sugar-rush/http://mysimpeg.gowakab.go.id/mysimpeg/aset/https://jurnal.jsa.ikippgriptk.ac.id/plugins/https://ppid.cimahikota.go.id/assets/demo/https://journals.zetech.ac.ke/scatter-hitam/https://silasa.sarolangunkab.go.id/swal/https://sipirus.sukabumikab.go.id/storage/uploads/-/sthai/https://sipirus.sukabumikab.go.id/storage/uploads/-/stoto/https://alwasilahlilhasanah.ac.id/starlight-princess-1000/https://www.remap.ugto.mx/pages/slot-luar-negeri-winrate-tertinggi/https://waper.serdangbedagaikab.go.id/storage/sgacor/https://waper.serdangbedagaikab.go.id/public/images/qrcode/slot-dana/https://siipbang.katingankab.go.id/storage_old/maxwin/https://waper.serdangbedagaikab.go.id/public/img/cover/10k/