Anomaly intrusion detection model using data mining techniques
Intrusion detection system has become an important component of a network infrastructure protection mechanism. There are generally two main methods or techniques in intrusion detection; misuse detection and anomaly detection. While it is imperative for IDSs to be adaptive and extensible in today’s n...
Saved in:
Main Authors: | , |
---|---|
Format: | Conference or Workshop Item |
Published: |
2006
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/24653/ http://comp.utm.my/pars/files/2013/04/ANOMALY-INTRUSION-DETECTION-MODEL-USING-DATA-MINING-TECHNIQUES.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|