Data mining techniques have been successfully applied in many different fields including marketing, manufacturing, process control, fraud detection, and network management. Over the past five years, a growing number of research projects have applied data mining to various problems in intrusion detection. This chapter surveys a representative cross section of these research efforts. Moreover, four characteristics of contemporary research are identified and discussed in a critical manner. Conclusions are drawn and directions for future research are suggested.
Keywords: Intrusion detection, data mining.
By: Klaus Julisch
Published in: Applications of Data Mining in Computer Security, D. Barbara and S. Jajodia (Eds.), Boston, Kluwer Academic Publisher in 2002
Please obtain a copy of this paper from your local library. IBM cannot distribute this paper externally.Questions about this service can be mailed to reports@us.ibm.com .