With the enlargement of web, there has been a terrific increases in the number of attacks and therefore Intrusion Detection Systems (IDS�s) has become a main topic of information security. The purpose of IDS is to help the computer systems to deal with attacks. The feature selection used in IDS helps to reduce the classification time. In this paper, the IDS for detecting the attacks efficiently has been proposed. We have proposed an algorithm based on associan rule to detect intrusion. We have combined algorithm with feature selection to improve efficiency of IDS.The proposed feature selection and associan rule algorithms enhance the performance of the IDS in detecting the attacks
Security in computer networks has become a critical point for many organizations, but keeping data i...
intrusion Detection System (IDS) is an important and necessary component in ensuring network securit...
AbstractIntrusion detection is the process of monitoring and analyzing the events occurring in a com...
Abstract: At present, network security needs to be concerned to provide secure information channels ...
AbstractIntrusion detection is the process of monitoring and analyzing the events occurring in a com...
Redundant and irrelevant features in data have caused a long-term problem in network traffic classif...
Redundant and irrelevant features in data have caused a long-term problem in network traffic classif...
Redundant and irrelevant features in data have caused a long-term problem in network traffic classif...
Some of the main challenges in developing an effective network-based intrusion detection system (IDS...
An intrusion detection system monitors whether the network event is malicious or normal for that net...
Intrusion Detection Systems (IDSs) play a significant role in monitoring and analyzing daily activit...
© 2014 IEEE. Intrusion Detection Systems (IDSs) play a significant role in monitoring and analyzing ...
Every day the number of devices interacting through telecommunications networks grows resulting into...
Detection of Intrusion is an essential expertise business segment as well as a dynamic area of study...
Intrusion detection systems (IDSs) are one of the promising tools for protecting data and networks; ...
Security in computer networks has become a critical point for many organizations, but keeping data i...
intrusion Detection System (IDS) is an important and necessary component in ensuring network securit...
AbstractIntrusion detection is the process of monitoring and analyzing the events occurring in a com...
Abstract: At present, network security needs to be concerned to provide secure information channels ...
AbstractIntrusion detection is the process of monitoring and analyzing the events occurring in a com...
Redundant and irrelevant features in data have caused a long-term problem in network traffic classif...
Redundant and irrelevant features in data have caused a long-term problem in network traffic classif...
Redundant and irrelevant features in data have caused a long-term problem in network traffic classif...
Some of the main challenges in developing an effective network-based intrusion detection system (IDS...
An intrusion detection system monitors whether the network event is malicious or normal for that net...
Intrusion Detection Systems (IDSs) play a significant role in monitoring and analyzing daily activit...
© 2014 IEEE. Intrusion Detection Systems (IDSs) play a significant role in monitoring and analyzing ...
Every day the number of devices interacting through telecommunications networks grows resulting into...
Detection of Intrusion is an essential expertise business segment as well as a dynamic area of study...
Intrusion detection systems (IDSs) are one of the promising tools for protecting data and networks; ...
Security in computer networks has become a critical point for many organizations, but keeping data i...
intrusion Detection System (IDS) is an important and necessary component in ensuring network securit...
AbstractIntrusion detection is the process of monitoring and analyzing the events occurring in a com...