(Publisher of Peer Reviewed Open Access Journals)

International Journal of Advanced Technology and Engineering Exploration (IJATEE)

ISSN (Print):2394-5443    ISSN (Online):2394-7454
Volume-3 Issue-25 December-2016
Full-Text PDF
DOI:10.19101/IJATEE.2016.325005
Paper Title : A survey an analysis for an efficient intrusion detection system
Author Name : Neeru Jain and Deepak Tomar
Abstract :

The process of identifying possible attacks in the network is called intrusion detection. As per the security concern it is very important to secure the connection and timely detection so that any fraud / unauthorized event will not be happened. The aim of this paper is to provide a better insight in the direction of intrusion detection and find the implications of different methodology as far presented. Different data mining techniques along with the evolutionary algorithms have been analyzed so that a better framework can be designed based on the hybridization of efficient algorithms. For this purpose denial of service (DoS), user to root (U2R), remote to user (R2L) and probe attacks have been considered in this paper.

Keywords : Intrusion detection, Data mining, Evolutionary algorithms, DoS, U2R, R2L and Probe.
Cite this article : Neeru Jain and Deepak Tomar, " A survey an analysis for an efficient intrusion detection system " , International Journal of Advanced Technology and Engineering Exploration (IJATEE), Volume-3, Issue-25, December-2016 ,pp.223-227.DOI:10.19101/IJATEE.2016.325005