International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 5 - Number 2 |
Year of Publication: 2010 |
Authors: Dr.J.A.Chandulal, Dr.K.Nageswara Rao, Shaik Akbar |
10.5120/892-1266 |
Dr.J.A.Chandulal, Dr.K.Nageswara Rao, Shaik Akbar . Intrusion Detection System Methodologies Based on Data Analysis. International Journal of Computer Applications. 5, 2 ( August 2010), 10-20. DOI=10.5120/892-1266
With the rapidly growing and wide spread use of computer networks the number of new threats has grown extensively. Intrusion and detection system can only identifying and protecting the attacks successfully. In this paper we focuses on detailed study of different types of attacks using in KDD99CUP Data Set and classification of IDS are also presented. They are Anomaly Detection System, Misuse Detection Systems. Different Data Analysis Methodologies also explained for IDS. To identify eleven data computing techniques associated with IDS are divided groups into categories. Some of those methods are based on computation such as Fuzzy logic and Bayesian networks, some are Artificial Intelligence such as Expert Systems, agents and neural networks some other are biological concepts such as Genetics and Immune systems.