{"title":"基于抗数据挖掘系统的混合网络入侵检测系统","authors":"H. Karim, Tjprc","doi":"10.24247/ijmperdjun2020398","DOIUrl":null,"url":null,"abstract":"Data mining methods can be very useful to add to the Intrusion Detection System(IDS) to identify common and suspicious activity patterns and help managers protect sensitive data and all information contained in busin esses or organizations. This paper attempts to analyze the types of network attacks and the existing IDS drifts based on Data Mining techniques. In recent days, the growth of science, information technology, and communications, in particular, has resulted in a rise in the quantity of digital data. These enormous quantities of information are no longer able to handle standard (statistical) techniques. Data Mining ( DM) has emerged and has proved to be one of the most successful alternatives for analyzing large quantities of data . Data Mining has been developed with the assistance of many fields, including Statistics, Databases, and Artificial Intelligence. This paper focuses on tracking IDS in a hybrid network using the Genetic Algorithm (GA), by applying essential functions of IDS technologies, standard detection methodologies as signature-based and anomaly-based methods of detection.","PeriodicalId":14009,"journal":{"name":"International Journal of Mechanical and Production Engineering Research and Development","volume":"7 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Intrusion Detection System in A Hybrid Network using Data Mining-Resistance System\",\"authors\":\"H. Karim, Tjprc\",\"doi\":\"10.24247/ijmperdjun2020398\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Data mining methods can be very useful to add to the Intrusion Detection System(IDS) to identify common and suspicious activity patterns and help managers protect sensitive data and all information contained in busin esses or organizations. This paper attempts to analyze the types of network attacks and the existing IDS drifts based on Data Mining techniques. In recent days, the growth of science, information technology, and communications, in particular, has resulted in a rise in the quantity of digital data. These enormous quantities of information are no longer able to handle standard (statistical) techniques. Data Mining ( DM) has emerged and has proved to be one of the most successful alternatives for analyzing large quantities of data . Data Mining has been developed with the assistance of many fields, including Statistics, Databases, and Artificial Intelligence. This paper focuses on tracking IDS in a hybrid network using the Genetic Algorithm (GA), by applying essential functions of IDS technologies, standard detection methodologies as signature-based and anomaly-based methods of detection.\",\"PeriodicalId\":14009,\"journal\":{\"name\":\"International Journal of Mechanical and Production Engineering Research and Development\",\"volume\":\"7 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Mechanical and Production Engineering Research and Development\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.24247/ijmperdjun2020398\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Mechanical and Production Engineering Research and Development","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.24247/ijmperdjun2020398","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Intrusion Detection System in A Hybrid Network using Data Mining-Resistance System
Data mining methods can be very useful to add to the Intrusion Detection System(IDS) to identify common and suspicious activity patterns and help managers protect sensitive data and all information contained in busin esses or organizations. This paper attempts to analyze the types of network attacks and the existing IDS drifts based on Data Mining techniques. In recent days, the growth of science, information technology, and communications, in particular, has resulted in a rise in the quantity of digital data. These enormous quantities of information are no longer able to handle standard (statistical) techniques. Data Mining ( DM) has emerged and has proved to be one of the most successful alternatives for analyzing large quantities of data . Data Mining has been developed with the assistance of many fields, including Statistics, Databases, and Artificial Intelligence. This paper focuses on tracking IDS in a hybrid network using the Genetic Algorithm (GA), by applying essential functions of IDS technologies, standard detection methodologies as signature-based and anomaly-based methods of detection.