International Conference on Recent Trends in Information Technology and Computer Science 2012 |
Foundation of Computer Science USA |
ICRTITCS2012 - Number 3 |
February 2013 |
Authors: Vaishali B Kosamkar, Sangita S Chaudhari |
dcd153b5-c08c-4f18-84a4-75c0d98c172e |
Vaishali B Kosamkar, Sangita S Chaudhari . Data Mining Algorithms for Intrusion Detection System: An Overview. International Conference on Recent Trends in Information Technology and Computer Science 2012. ICRTITCS2012, 3 (February 2013), 9-15.
In recent years, network based services and network based attacks have grown significantly. The network based attacks can also be considered as some kind of intrusion. Intrusion can be defined as "any set of actions that attempt to compromise the integrity, confidentiality or availability of a resource". For controlling intrusion, intrusion detection systems are employed. The three important characteristics of intrusion detection systems are accuracy, extensibility and adaptability. The attacks generally change their types; so we need to update the detection rules to notice new attacks. Several techniques such as data mining, statistics, and genetic algorithm have been used for intrusion detection. Most recently, the data mining techniques have been used to mine the normal pattern from the audit data. This paper presents the survey on data mining Algorithms applied on intrusion detection systems for the effective identification of both known and unknown patterns of attacks, thereby helping the users to develop secure information systems.