Literature DB >> 34290487

A SURVEY ON THE USE OF DATA CLUSTERING FOR INTRUSION DETECTION SYSTEM IN CYBERSECURITY.

Binita Bohara1, Jay Bhuyan1, Fan Wu1, Junhua Ding2.   

Abstract

In the present world, it is difficult to realize any computing application working on a standalone computing device without connecting it to the network. A large amount of data is transferred over the network from one device to another. As networking is expanding, security is becoming a major concern. Therefore, it has become important to maintain a high level of security to ensure that a safe and secure connection is established among the devices. An intrusion detection system (IDS) is therefore used to differentiate between the legitimate and illegitimate activities on the system. There are different techniques are used for detecting intrusions in the intrusion detection system. This paper presents the different clustering techniques that have been implemented by different researchers in their relevant articles. This survey was carried out on 30 papers and it presents what different datasets were used by different researchers and what evaluation metrics were used to evaluate the performance of IDS. This paper also highlights the pros and cons of each clustering technique used for IDS, which can be used as a basis for future work.

Keywords:  Intrusion detection system; clustering technique; network security

Year:  2020        PMID: 34290487      PMCID: PMC8289996          DOI: 10.5121/ijnsa.2020.12101

Source DB:  PubMed          Journal:  Int J Netw Secur Appl        ISSN: 0974-9330


  1 in total

1.  A Modified ResNeXt for Android Malware Identification and Classification.

Authors:  Marwan Ali Albahar; Mahmoud Said ElSayed; Anca Jurcut
Journal:  Comput Intell Neurosci       Date:  2022-05-20
  1 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.