Data Mining for Intrusion Detection

Data mining techniques have been successfully applied in many different fields including marketing, manufacturing, process control, fraud detection, and network management. Over the past five years, a growing number of research projects have applied data mining to various problems in intrusion detection. This chapter surveys a representative cross section of these research efforts. Moreover, four characteristics of contemporary research are identified and discussed in a critical manner. Conclusions are drawn and directions for future research are suggested.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic €32.70 /Month

Buy Now

Price includes VAT (France)

eBook EUR 85.59 Price includes VAT (France)

Softcover Book EUR 105.49 Price includes VAT (France)

Hardcover Book EUR 105.49 Price includes VAT (France)

Tax calculation will be finalised at checkout

Purchases are for personal use only

Preview

Similar content being viewed by others

A Survey and Taxonomy on Data and Pre-processing Techniques of Intrusion Detection Systems

Chapter © 2018

Challenges and Opportunities for Network Intrusion Detection in a Big Data Environment

Chapter © 2024

A Practical Review on Intrusion Detection Systems by Known Data Mining Methods

Chapter © 2021

References

Author information

Authors and Affiliations

  1. IBM Research, Zurich Research Laboratory, Zurich, Switzerland Klaus Julisch
  1. Klaus Julisch