Analyze Different approaches for IDS using KDD 99 Data Set

Main Article Content

Mr. Kamlesh Lahre, Mr. Tarun dhar Diwan, Suresh Kumar Kashyap, Pooja Agrawal

Abstract

the integrity, confidentiality, and availability of Network security is one of the challenging issue and so as Intrusion Detection system (IDS). IDS are an essential component of the network to be secured. Intrusion detection is the process of monitoring and analyzing the events occurring in a computer system in order to detect signs of security problems. Intrusion detection includes identifying a set of malicious actions that compromise information resources. Traditional methods for in trusion detection are based on extensive knowledge of signatures of known attacks . In the last three years, the networking revolution has finally come of age. More than ever before, we see that the Internet is changing computing, as we know it. The possibilities and opportunities are limitless; unfortunately, so too are the risks and chances of malicious intrusions There are two primary methods of monitoring these are signature - based and anomaly based. In this paper is to analyze different approaches of IDS . Some approach belongs to supervised method and some approach belongs to unsupervised method.

Article Details

How to Cite
, M. K. L. M. T. dhar D. S. K. K. P. A. (2013). Analyze Different approaches for IDS using KDD 99 Data Set. International Journal on Recent and Innovation Trends in Computing and Communication, 1(8), 645–651. https://doi.org/10.17762/ijritcc.v1i8.2837
Section
Articles