ACADSTAFF UGM

CREATION
Title : Survey of Data Mining Techniques for Intrusion Detection Systems
Author :

ADITYA NUR CAHYO (1) Drs. Edi Winarko, M.Sc.,Ph.D. (2) Aina Musdholifah, S.Kom., M.Kom. Ph.D (3)

Date : 0 2020
Keyword : Data mining,Machine learning,IDS,Anomaly IDS,Misuse IDS Data mining,Machine learning,IDS,Anomaly IDS,Misuse IDS
Abstract : Nowadays, the number of cyber-attacks is increasing; therefore, it is important for companies or organizations to secure their networks. Intrusion Detection System (IDS) is one of the core components used to secure networks. IDS's role is to detect an attack or attempted attack. The security tools are growing rapidly, along with the increasing number and variety of attacks carried out. The same with the development of IDS, a lot of research has been done to improve the ability of IDS to detect an attack. Many studies have used data mining techniques on IDS. This paper aims to conduct a comprehensive survey on the use of data mining techniques on IDS in the last five years. In this survey, we category the techniques used into several categories, and discuss each category in detail.
Group of Knowledge :
Level : Internasional
Status :
Published
Document
No Title Document Type Action
1 2020-Survey of data mining techniques for intrusion detection systems-turnitin.pdf
Document Type : Cek Similarity
Cek Similarity View
2 Front_mater.pdf
Document Type : Seminar Sampul Prosiding
Seminar Sampul Prosiding View
3 2020-ICIC-survey data mining for intrusion detection-CWM.pdf
Document Type : Artikel dan Sertifikat/Bukti Kehadiran/Pasport (jika tidak ada sertifikat)
Artikel dan Sertifikat/Bukti Kehadiran/Pasport (jika tidak ada sertifikat) View
4 Table_of_Content.pdf
Document Type : Daftar Isi
Daftar Isi View