My Research

lorem ipsum dolor sit
lorem ipsum dolor sit
lorem ipsum dolor sit
lorem ipsum dolor sit
lorem ipsum dolor sit
lorem ipsum dolor sit
lorem ipsum dolor sit
lorem ipsum dolor sit
lorem ipsum dolor sit
lorem ipsum dolor sit
lorem ipsum dolor sit
lorem ipsum dolor sit
lorem ipsum dolor sit
lorem ipsum dolor sit
lorem ipsum dolor sit
lorem ipsum dolor sit
lorem ipsum dolor sit
lorem ipsum dolor sit
lorem ipsum dolor sit
lorem ipsum dolor sit
lorem ipsum dolor sit
lorem ipsum dolor sit
lorem ipsum dolor sit
lorem ipsum dolor sit
lorem ipsum dolor sit
lorem ipsum dolor sit
lorem ipsum dolor sit
lorem ipsum dolor sit
lorem ipsum dolor sit
lorem ipsum dolor sit

Provides a method for investigation and intrusion detection using data mining

 

Saman Siadati *, M. Jafar Tarokh **

 

Abstract: 
Regardless of the widespread extension of the information area, security is one of the most important areas in computers and systems, so other inventions that can be used are intrusion detection systems. These systems are capable of detecting infiltrations such as viruses, Trojan horses and more. Data mining is used to clear, distinguish, and search for a large amount of system information. In this paper, various data mining techniques are used to detect intrusions carried out on the network.

Keywords:
Security, Innovation, Intrusion Detection System, Infiltration, Data Mining, Viruses, Troy Horses

 

 

 

*,** Strategic Intelligence Research Laboratory, K.N.T. university of technology, Tehran, Iran