Detection of Cyber Attack in Network Using Machine Learning Techniques
Keywords:
IDS, Network, Cyber Security, Cyber AttacksAbstract
Intrusion Detection is one of network security area of technology main research directions. Data mining technology will be applied to Network Intrusion Detection System (NIDS), may automatically discover the new pattern from the massive network data, to reduce the workload of the manual compilation intrusion behavior patterns and normal behavior patterns. This article reviewed the current intrusion detection technology and the data mining technology briefly. Focus on data mining algorithm in anomaly detection and misuse detection of specific applications. For misuse detection, the main study the classification algorithm; For anomaly detection, the main study the pattern comparison and the cluster algorithm. In pattern comparison to analysis deeply the association rules and sequence rules. Finally, has analyzed the difficulties which the current data mining algorithm in intrusion detection applications faced at present, and has indicated the next research direction.
References
- Zhen-Ya Zhang, Hong-Mei Cheng, et al. From data mining to Opportunity / symptoms found. Computer Science. 2007.
- Dai Yingxia, lian Yi-feng, Wang hang. Security and intrusion detection systems [M]. Beijing: Tsinghua University Press, 2002.
- I. S. Jacobs and C. P. Bean, “Fine particles, thin films and exchange anisotropy,” in Magnetism, vol. III, G. T. Rado and H. Suhl, Eds. New York: Academic, 1963, pp. 271–350.
- XuZhuoqun. Construction of data [M]. Beijing: China Broadcast television University Publishing house, 2001: 260- 272.
- Liu xin, Zhang Yongping, Wanyanli. Decision Tree Algorithm in Intrusion Detection System Analysis and Improvement. Computer Engineering and Design 2006 .
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.