Intrusion detection system (IDS) is becoming a vital component to secure the network. A successful intrusion detection system requires high accuracy and detection rate. In this paper a hybrid approach for intrusion detection system based on data mining techniques is proposed. The principal ingredients of the approach are weighted k-means clustering and naive bayes classification. The C5.0 algorithm is used for ranking attributes, so the attributes receive a weight which is used in K-means clustering therefore accuracy of clustering is increased
Intrusion Detection System used to discover attacks against computers and network Infrastructures. T...
Data mining techniques play an increasing role in the intrusion detection by analyzing network data ...
Internet is the biggest platform for people all over the world to connect with each other, and to se...
Intrusion Detection System (IDS) plays an effective way to achieve higher security in detecting mali...
Abstract—The rapid growth of network based activities makes computer security is a more crucial issu...
Intrusion detection systems (IDSs) effectively balance extra security appliance by identifying intru...
Intrusion Detection Systems (IDS) have become an important building block of any sound defense netwo...
Abstract- The traditional Intrusion detection systems have been used long time ago, namely Anomaly-...
Intrusion detection systems (IDSs) effectively balance extra security appliance by identifying intru...
Information security and Intrusion Detection System (IDS) plays a critical role in the Internet. IDS...
Many current NIDSs are rule-based systems, which are very difficult in encoding rules, and cannot de...
AbstractMany current NIDSs are rule-based systems, which are very difficult in encoding rules, and c...
Now in these days due to rapidly increasing network applications the data and privacy security in ne...
AbstractA common problem shared by current IDS is the high false positives and low detection rate. A...
Intrusion detection system (IDS) is used to detect various kinds of attacks in interconnected networ...
Intrusion Detection System used to discover attacks against computers and network Infrastructures. T...
Data mining techniques play an increasing role in the intrusion detection by analyzing network data ...
Internet is the biggest platform for people all over the world to connect with each other, and to se...
Intrusion Detection System (IDS) plays an effective way to achieve higher security in detecting mali...
Abstract—The rapid growth of network based activities makes computer security is a more crucial issu...
Intrusion detection systems (IDSs) effectively balance extra security appliance by identifying intru...
Intrusion Detection Systems (IDS) have become an important building block of any sound defense netwo...
Abstract- The traditional Intrusion detection systems have been used long time ago, namely Anomaly-...
Intrusion detection systems (IDSs) effectively balance extra security appliance by identifying intru...
Information security and Intrusion Detection System (IDS) plays a critical role in the Internet. IDS...
Many current NIDSs are rule-based systems, which are very difficult in encoding rules, and cannot de...
AbstractMany current NIDSs are rule-based systems, which are very difficult in encoding rules, and c...
Now in these days due to rapidly increasing network applications the data and privacy security in ne...
AbstractA common problem shared by current IDS is the high false positives and low detection rate. A...
Intrusion detection system (IDS) is used to detect various kinds of attacks in interconnected networ...
Intrusion Detection System used to discover attacks against computers and network Infrastructures. T...
Data mining techniques play an increasing role in the intrusion detection by analyzing network data ...
Internet is the biggest platform for people all over the world to connect with each other, and to se...