International Conference on Advances in Science and Technology |
Foundation of Computer Science USA |
ICAST2014 - Number 4 |
February 2015 |
Authors: Purtata Bhoir, Shilpa Kolte |
a99879f9-ccb3-4ca4-af37-4ed698d842a9 |
Purtata Bhoir, Shilpa Kolte . A Novel Survey on Intrusion Detection using Data Mining. International Conference on Advances in Science and Technology. ICAST2014, 4 (February 2015), 26-29.
Database security is vital nowadays as database system contain valuable information. In today's computer world, attacks are used to disclose, destroy, alter, or steal information. The information security plays vital role to protect confidentiality, integrity and availability of information. Intrusion detection system (IDS) is one of the important components of strong information security system. IDS serve three security functions: they monitor, detect and respond to unauthorized activity. Researchers are working on various data mining techniques such as access patterns of users, data dependencies to detect malicious attacks. Data mining is widely used to find useful patterns from large volume of data. In this paper we have enlisted some existing ID approaches of data mining for detecting insider attacks and compared them with considering their advantages and disadvantages.