A Survey and Comparative Analysis of Data Mining Techniques for Network Intrusion Detection Systems
Reema Patel1, Amit Thakkar2, Amit Ganatra3
1Reema Patel, Department of Information Technology, Charotar University of Science and Technology, Changa 388421, Anand, Gujarat
2Amit Thakkar, Department of Information Technology, Charotar University of Science and Technology, Changa 388421, Anand, Gujarat.
3Amit Ganatra, U and P U Patel Department of Computer Engineering, Charotar University of Science and Technology, Changa 388421, Anand, Gujarat.
Manuscript received on February 15, 2012. | Revised Manuscript received on February 20, 2012. | Manuscript published on March 05, 2012. | PP: 265-217 | Volume-2 Issue-1, March 2012. | Retrieval Number: A0432022112/2012©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Despite of growing information technology widely, security has remained one challenging area for computers and networks. In information security, intrusion detection is the act of detecting actions that attempt to compromise the confidentiality, integrity or availability of a resource. Currently many researchers have focused on intrusion detection system based on data mining techniques as an efficient artifice. Data mining is one of the technologies applied to intrusion detection to invent a new pattern from the massive network data as well as to reduce the strain of the manual compilations of the intrusion and normal behavior patterns. This article reviews the current state of art data mining techniques, compares various data mining techniques used to implement an intrusion detection system such as Decision Trees, Artificial Neural Network, Naïve Bayes, Support Vector Machine and K- Nearest Neighbour Algorithm by highlighting advantages and disadvantages of each of the techniques. Finally, a discussion of the future technologies and methodologies which promise to enhance the ability of computer systems to detect intrusion is provided and current research challenges are pointed out in the field of intrusion detection system.
Keywords: Classification, Data Mining, Intrusion Detection System