Data Mining for Intrusion Detection A Critical Review

          Data mining techniques have been successfully applied in many different fields including marketing, manufacturing, process control, fraud detection, and network management. Over the past five years, a growing number of research projects have applied data mining to various problems in intrusion detection. This chapter surveys a representative cross section of these research efforts. Moreover, four characteristics of contemporary research are identified and discussed in a critical manner. Conclusions are drawn and directions for future research are suggested.

          Keywords: Intrusion detection, data mining.

By: Klaus Julisch

Published in: Applications of Data Mining in Computer Security, D. Barbara and S. Jajodia (Eds.), Boston, Kluwer Academic Publisher in 2002

Please obtain a copy of this paper from your local library. IBM cannot distribute this paper externally.

Questions about this service can be mailed to reports@us.ibm.com .