Data Mining Techniques for Network Intrusion Detection and Prevention Systems

Abstract

The main purpose of Intrusion Detection Systems(IDS) and Intrusion protection Systems(IPS) for data mining is to discover patterns of program and user activity, and determine what set of events indicate an attack. In the last years, the networking revolution has finally come of age. More than ever before, we see that the Internet is changing computing as we know it. The possibilities and opportunities are limitless; unfortunately, so too are the risks and chances of malicious intrusions. In Network Security, intrusion detection and prevention system is the act of detecting activity or action that attempt to compromise the confidentiality, integrity or availability of a resource. Intrusion prevention techniques, such as user authentication avoiding programming errors, and information protection (e.g., encryption) have been used to protect computer systems is act as first line of defense. We focus on issues related to deploying a data mining-based IDS in a real time of networking environment. To improve accuracy and security, data mining programs are used to analyze audit data and extract features that can distinguish normal activities from intrusions. In this paper presents an intrusion detection system architecture consisting of network sensors, detectors, a data warehouse, and model generation components and we can identify network attack and which type of attack on databases being take place.

Authors and Affiliations

Nareshkumar D. Harale, Dr. B. B. Meshram

Keywords

Related Articles

Multiauditing Based Cloud Storage Using Dynamic Hash Table

Cloud vault is one of the standard supplication of distributed computing framework, which offers on-request offloading administrations for the two people and establishments. in spite of the fact that, utilizers don't hav...

An Overview of the Green Internet of Things (IoT)

In line of the huge scope of the digital context, the number of subscribers of digital services, and the number of digital devices, levels of energy intake have reached alarming levels during the last decade. By 2020, th...

Study on Soil Stabilization Using Rice Husk Ash and Cement In Marshy Soils

The current study was conducted on marshy soils found at Rakh Arth Bemina in Srinagar, J&K,India with the goal of quantifying the effect of rice husk ash and cement on the soil's dry density, optimum moisture content an...

Novel Method of Speed Control of 3 Phase Induction Motor by Chopper Circuit

Power electronics advancements in recent years have had a significant influence on the functioning induction machine drives, as well as speed control My work provides a novel stinger approach for managing the pitch of a...

A Problem-Solving Approach to Addressing Current Educational Global Challenges

This study starts with an examination of worldwide issues affecting teaching, especially as they relate to knowledge and career opportunities. A variety of philosophical viewpoints and debates are examined in order to ad...

Download PDF file
  • EP ID EP748501
  • DOI 10.21276/ijircst.2016.4.6.3
  • Views 45
  • Downloads 0

How To Cite

Nareshkumar D. Harale, Dr. B. B. Meshram (2016). Data Mining Techniques for Network Intrusion Detection and Prevention Systems. International Journal of Innovative Research in Computer Science and Technology, 4(6), -. https://www.europub.co.uk/articles/-A-748501