Intrusion Detection Techniques Using Data Mining: Analysis

  • Unique Paper ID: 149590
  • Volume: 7
  • Issue: 1
  • PageNo: 1-7
  • Abstract:
  • Advance computing is the most extreme basic part utilized component that has aimed to reserve the information by the machines which does not have adequate capacity abilities. The advance computing will be the system which enables machines to reserve the information over the capacity abilities of the specific machine. The security of user identity is on risk because many users interact through it. To handle data mining data security various types of intrusion detection techniques has been utilized. But these techniques utilized more space and less security, so in this paper we analysis various techniques used for intrusion detection.

Copyright & License

Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{149590,
        author = {Rishi Kishan and Suraj Pal},
        title = {Intrusion Detection Techniques Using Data Mining: Analysis},
        journal = {International Journal of Innovative Research in Technology},
        year = {},
        volume = {7},
        number = {1},
        pages = {1-7},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=149590},
        abstract = {Advance computing is the most extreme basic part utilized component that has aimed to reserve the information by the machines which does not have adequate capacity abilities. The advance computing will be the system which enables machines to reserve the information over the capacity abilities of the specific machine. The security of user identity is on risk because many users interact through it. To handle data mining data security various types of intrusion detection techniques has been utilized. But these techniques utilized more space and less security, so in this paper we analysis various techniques used for intrusion detection.},
        keywords = {Security, Intrusion detection, Byte level, space},
        month = {},
        }

Cite This Article

  • ISSN: 2349-6002
  • Volume: 7
  • Issue: 1
  • PageNo: 1-7

Intrusion Detection Techniques Using Data Mining: Analysis

Related Articles