{"title":"入侵检测系统数据挖掘技术综述","authors":"Aditya Nur Cahyo, E. Winarko, Aina Musdholifah","doi":"10.1109/ICIC50835.2020.9288621","DOIUrl":null,"url":null,"abstract":"Nowadays, the number of cyber-attacks is increasing; therefore, it is important for companies or organizations to secure their networks. Intrusion Detection System (IDS) is one of the core components used to secure networks. IDS's role is to detect an attack or attempted attack. The security tools are growing rapidly, along with the increasing number and variety of attacks carried out. The same with the development of IDS, a lot of research has been done to improve the ability of IDS to detect an attack. Many studies have used data mining techniques on IDS. This paper aims to conduct a comprehensive survey on the use of data mining techniques on IDS in the last five years. In this survey, we category the techniques used into several categories, and discuss each category in detail.","PeriodicalId":413610,"journal":{"name":"2020 Fifth International Conference on Informatics and Computing (ICIC)","volume":"51 5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Survey of Data Mining Techniques for Intrusion Detection Systems\",\"authors\":\"Aditya Nur Cahyo, E. Winarko, Aina Musdholifah\",\"doi\":\"10.1109/ICIC50835.2020.9288621\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Nowadays, the number of cyber-attacks is increasing; therefore, it is important for companies or organizations to secure their networks. Intrusion Detection System (IDS) is one of the core components used to secure networks. IDS's role is to detect an attack or attempted attack. The security tools are growing rapidly, along with the increasing number and variety of attacks carried out. The same with the development of IDS, a lot of research has been done to improve the ability of IDS to detect an attack. Many studies have used data mining techniques on IDS. This paper aims to conduct a comprehensive survey on the use of data mining techniques on IDS in the last five years. In this survey, we category the techniques used into several categories, and discuss each category in detail.\",\"PeriodicalId\":413610,\"journal\":{\"name\":\"2020 Fifth International Conference on Informatics and Computing (ICIC)\",\"volume\":\"51 5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-11-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 Fifth International Conference on Informatics and Computing (ICIC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICIC50835.2020.9288621\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 Fifth International Conference on Informatics and Computing (ICIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIC50835.2020.9288621","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Survey of Data Mining Techniques for Intrusion Detection Systems
Nowadays, the number of cyber-attacks is increasing; therefore, it is important for companies or organizations to secure their networks. Intrusion Detection System (IDS) is one of the core components used to secure networks. IDS's role is to detect an attack or attempted attack. The security tools are growing rapidly, along with the increasing number and variety of attacks carried out. The same with the development of IDS, a lot of research has been done to improve the ability of IDS to detect an attack. Many studies have used data mining techniques on IDS. This paper aims to conduct a comprehensive survey on the use of data mining techniques on IDS in the last five years. In this survey, we category the techniques used into several categories, and discuss each category in detail.