This paper is published in Volume-5, Issue-5, 2019
Area
Intrusion Detection
Author
Rayees Ahmad Sheikh, Abhishek Bhardwaj
Org/Univ
CT Group of Institutions, Jalandhar, Punjab, India
Keywords
Intrusion detection, Chi-square
Citations
IEEE
Rayees Ahmad Sheikh, Abhishek Bhardwaj. A review on integrating intrusion detection model using classifiers and chi-square feature selection, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Rayees Ahmad Sheikh, Abhishek Bhardwaj (2019). A review on integrating intrusion detection model using classifiers and chi-square feature selection. International Journal of Advance Research, Ideas and Innovations in Technology, 5(5) www.IJARIIT.com.
MLA
Rayees Ahmad Sheikh, Abhishek Bhardwaj. "A review on integrating intrusion detection model using classifiers and chi-square feature selection." International Journal of Advance Research, Ideas and Innovations in Technology 5.5 (2019). www.IJARIIT.com.
Rayees Ahmad Sheikh, Abhishek Bhardwaj. A review on integrating intrusion detection model using classifiers and chi-square feature selection, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Rayees Ahmad Sheikh, Abhishek Bhardwaj (2019). A review on integrating intrusion detection model using classifiers and chi-square feature selection. International Journal of Advance Research, Ideas and Innovations in Technology, 5(5) www.IJARIIT.com.
MLA
Rayees Ahmad Sheikh, Abhishek Bhardwaj. "A review on integrating intrusion detection model using classifiers and chi-square feature selection." International Journal of Advance Research, Ideas and Innovations in Technology 5.5 (2019). www.IJARIIT.com.
Abstract
With the increasing use of IT technologies for maintaining the information, there is huge need for stronger intrusion detection mechanisms. The old usages like firewalls are not much so effective there are few new techniques that are used for the detection of intrusions. The various techniques of Intrusion Detection have been studied briefly. The main aim of this paper is to increase the accuracy with maximum and decrease with fewer false alarms. Also concern about reducing the disadvantages of the present IDS for large data. The intrusions enter the systems without any allowances to replicate files and running pirated software’s on their own to access systems and takes the very much confidential data like sensitive information. Intrusion detection can take care of the systems and if something suspicious happens the prompt will be given and monitored.