Please use this identifier to cite or link to this item:
http://localhost:8080/xmlui/handle/123456789/4195
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Deepa, V | - |
dc.contributor.author | Radha, N | - |
dc.date.accessioned | 2023-11-10T08:15:23Z | - |
dc.date.available | 2023-11-10T08:15:23Z | - |
dc.date.issued | 2021 | - |
dc.identifier.uri | https://iopscience.iop.org/article/10.1088/1757-899X/1022/1/012036/pdf | - |
dc.description.abstract | Wireless Local Area Network (WLAN) security management is now being confronted by rapid expansion in wireless network errors, flaws and assaults. In recent times, as computers are used extensively through network and application creation on numerous platforms, attention is provided to network security. This definition includes security vulnerabilities in both complicated and costly operating programs. Intrusion is also seen as a method of breaching security, completeness and availability. Intrusion Detection System (IDS) is an essential method for the identification of network security vulnerabilities and abnormalities. A variety of significant work has been carried out on intrusion detection technologies often seen as premature not as a complete method for countering intrusion. It has also become a most challenging and priority tasks for security experts and network administrators. Hence, it cannot be replaced by more secure systems. Data mining used for IDS can effectively identify intrusion and the identified intrusion values are used to predict further intrusion in future. This paper presents a detailed review of literature about how data mining techniques were utilized for intrusion detection. First, intrusion detection on various benchmark and real-time datasets by data mining techniques are studied in detail. Then, comparative study is conducted with their merits and demerits for identifying the challenges in those techniques and then this paper is concluded with suggestions of solutions for enhancing the efficiency of intrusion detection in the network. | en_US |
dc.language.iso | en_US | en_US |
dc.publisher | IOP Publishing Ltd | en_US |
dc.title | A SURVEY ON NETWORK INTRUSION SYSTEM ATTACKS CLASSIFICATION USING MACHINE LEARNING TECHNIQUES | en_US |
dc.type | Other | en_US |
Appears in Collections: | 4.Conference Paper (13) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
A SURVEY ON NETWORK INTRUSION SYSTEM ATTACKS CLASSIFICATION USING MACHINE LEARNING TECHNIQUES.pdf | 824.47 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.