Open Access Open Access  Restricted Access Subscription or Fee Access

An Appraisal and Proportional Study of Data Mining Techniques for Web Intrusion Detection Methods

S. Lakshmi Devi, S. P. Priyadharshini


Despite of growing statistics technology widely, security has remained one stimulating area for computers and webs. In statistics security, intrusion detection is the act of detecting actions that attempt to compromise the confidentiality, integrity or availability of a resource. Currently many researchers have focused on intrusion detection methods based on data mining techniques as an efficient artifice. Data mining is one of the technologies applied to intrusion detection to invent a new pattern from the massive web data as well as to reduce the strain of the manual compilations of the intrusion and normal behavior patterns. This article reviews the current state of art data mining techniques, compares various data mining techniques used to implement an intrusion detection methods such as Decision Trees, Artificial Neural Web, Naïve Bayes, Support Vector Machine and K- Nearest Neighbour Algorithm by highlighting advantages and disadvantages of each of the techniques. Finally, a discussion of the future technologies and methodologies which promise to enhance the ability of computer methods to detect intrusion is provided and current research challenges are pointed out in the field of intrusion detection methods.


Classification, Data Mining, Intrusion Detection Methods

Full Text:



Amoroso EG (1999) Intrusion detection: an introduction to internet surveillance, correlation, trace back, traps, and response. Intrusion.Net Books, NJ

Lunt, T.F. (1989). Real -Time Intrusion Detection. Proceedings from IEEE COMPCON.

James Cannady, Jay Harrell (1996). A proportional Analysis of current Intrusio n Detection Technologies.

(SANS: FAQ: Data Mining in Intrusion Detection) g.php

W. Lee. A Data Mining Framework for Constructing Features and Models for Intrusion Detection Methods. PhD Thesis, Computer Science Department, Columbia University, June 1999.

W. Lee and S. Stolfo. Data Mining Approaches for Intrusion Detection. In proceedings of the 7th USENIX Security Symposium, 1998.

Data Mining Machine Learning Techniques – A Study on Abnormal Anomaly Detection Methods. M. Sathya Narayana, B. V. V. S. Prasad,A. Srividhya,K. Pandu Ranga Reddy. Issue 6, September 2011, International Journal of Computer Science and Telecommunications, Vol. Volume 2, pp. 8-14. ISSN 2047-3338.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.