|A Review On data mining approach for network security|
|Er. Vibha, Er. Ankur gupta|
|Cite This Article:|
A Review On data mining approach for network security, International Journal of Innovative Research in Technology(www.ijirt.org) ,ISSN: 2349-6002 ,Volume 5 ,Issue 11 ,Page(s):446-454 ,January 2019 ,Available :IJIRT147522_PAPER.pdf
|data mining, network security, cyber attack|
|Over the last decade, we have become too much technology dependent. Now-a-days we rely on networks to receive emails, banking, stock price, news and online shopping. The need for protecting files in computer systems became more evident with the advent of shared systems. The need became even more severe for systems being accessed over a public network, the Internet. Information in transit must be protected from unauthorized release and changes. The connection itself must be securely established and maintained. The term network security defines that, Network is interconnection (or link) for example network of computers and Security is the freedom from danger or anxiety so Network Security is about securing and protecting the network (externally and internally) from Distributed Denial of Service attacks, rapidly spreading viruses, self-replicating worms, destructive malware and other attacks. Network security begins with authorization and authentication. Organizations are spending billions of dollars just to make their network secure and protect their data from outside and inside attack. However securing and protecting today’s complex network in not so easy, it is challenging and demanding . There are many traditional security solutions existing but these solutions do not perform well. here we discuss a survey on various proposed security solution for data.|
|Unique Paper ID: 147522|
Publication Volume & Issue: Volume 5, Issue 11
Page(s): 446 - 454
|Article Preview & Download|
Virtual Instrumentation: An oscilloscope based on ...
Paper ID : IJIRT148798
Heat Transfer Augmentation Using Twisted Tape Inse...
Paper ID : IJIRT148786
SOFTWARE ARCHITECTURAL STYLES IN THE INTERNET OF T...
Paper ID : IJIRT148785
Comprehensive Analysis of Energy Aware Clustering ...
Paper ID : IJIRT148784
Performance Analysis of Solar Water Heater Evacuat...
Paper ID : IJIRT148783