LITERATURE REVIEW OF VARIOUS DATA MINING BASED TECHNIQUES FOR IDS DATA CLASSIFICATION

  • Unique Paper ID: 148008
  • Volume: 5
  • Issue: 12
  • PageNo: 68-70
  • Abstract:
  • Interruption recognition is to recognize assaults against a PC framework. It is an essential innovation in business segment just as a functioning territory of research. In Information Security, interruption discovery is the demonstration of recognizing activities that endeavor to bargain the privacy, honesty or accessibility of an asset. It assumes an essential job in assault identification, security check and system review. This paper shows a writing survey of present day characterization strategies for interruption location framework. A large portion of these strategies depend on information arrangement and bunching. For the most part they utilize the choice tree for grouping of information. Choice tree is built by first figuring the data increase or entropy of each characteristic and afterward part the trait sets. KDD 99 informational index is utilized in execution and it is arranged utilizing distinctive methods.

Copyright & License

Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{148008,
        author = {Salina Warsi and Priyanka Dubey},
        title = {LITERATURE REVIEW OF VARIOUS DATA MINING BASED TECHNIQUES FOR IDS DATA CLASSIFICATION},
        journal = {International Journal of Innovative Research in Technology},
        year = {},
        volume = {5},
        number = {12},
        pages = {68-70},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=148008},
        abstract = {Interruption recognition is to recognize assaults against a PC framework. It is an essential innovation in business segment just as a functioning territory of research. In Information Security, interruption discovery is the demonstration of recognizing activities that endeavor to bargain the privacy, honesty or accessibility of an asset. It assumes an essential job in assault identification, security check and system review. This paper shows a writing survey of present day characterization strategies for interruption location framework. A large portion of these strategies depend on information arrangement and bunching. For the most part they utilize the choice tree for grouping of information. Choice tree is built by first figuring the data increase or entropy of each characteristic and afterward part the trait sets. KDD 99 informational index is utilized in execution and it is arranged utilizing distinctive methods.},
        keywords = {IDS, Classification, Clustering, Neural Network.},
        month = {},
        }

Cite This Article

  • ISSN: 2349-6002
  • Volume: 5
  • Issue: 12
  • PageNo: 68-70

LITERATURE REVIEW OF VARIOUS DATA MINING BASED TECHNIQUES FOR IDS DATA CLASSIFICATION

Related Articles