DOI:10.20894/IJDMTA.
Periodicity: Bi Annual.
Impact Factor:
SJIF:4.893 & GIF:0.787
Submission:Any Time
Publisher: IIR Groups
Language: English
Review Process:
Double Blinded

News and Updates

Author can submit their paper through online submission. Click here

Paper Submission -> Blind Peer Review Process -> Acceptance -> Publication.

On an average time is 3 to 5 days from submission to first decision of manuscripts.

Double blind review and Plagiarism report ensure the originality

IJDMTA provides online manuscript tracking system.

Every issue of Journal of IJDMTA is available online from volume 1 issue 1 to the latest published issue with month and year.

Paper Submission:
Any Time
Review process:
One to Two week
Journal Publication:
June / December

IJDMTA special issue invites the papers from the NATIONAL CONFERENCE, INTERNATIONAL CONFERENCE, SEMINAR conducted by colleges, university, etc. The Group of paper will accept with some concession and will publish in IJDMTA website. For complete procedure, contact us at admin@iirgroups.org

Paper Template
Copyright Form
Subscription Form
web counter
web counter
Published in:   Vol. 1 Issue 1 Date of Publication:   June 2012

Study on Data Mining Suitability for Intrusion Detection System (IDS)

S.Vijaya Peterraj,S.Pauline Precilla Mary

Page(s):   9-13 ISSN:   2278-2397
DOI:   10.20894/IJDMTA.102.001.001.003 Publisher:   Integrated Intelligent Research (IIR)


  1. Amanpreet Chauhan, Gaurav Mishra, Gulshan Kumar,   "International Journal of Scientific & Engineering   ,Vol.2   ,Issue 7   ,2011
    View Artical

  2. Dr. Adnan Mohsin Abdulazeez Brifcani & Adel Sabry Issa,   "Intrusion Detection and Attack Classifier Based on Three Techniques: A Comparative Study   ,2011
    View Artical

  3. Aleksandar Lazarevic, Levent Ertoz, Vipin Kumar, Aysel Ozgur,Jaideep Srivastava,   "A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection
    View Artical

  4. Yu Guan and Ali A. Ghorbani and Nabil Belacel,   "Y-MEANS: A CLUSTERING METHOD FOR INTRUSION DETECTION
    View Artical

  5. Safaa O. Al-Mamory, Hongli Zhang on,   "New data mining technique to enhance IDS alarms quality
    View Artical

  6. Manganaris, S., Christensen, M., Zerkle, D., Hermiz, and K,   "A data mining analysis of RTID alarms.   ,2000
    View Artical

  7. E. Bloedorn,,   "Data Mining for Network Intrusion Detection: How to Get Started",   MITRE Technical Report   ,2001
    View Artical

  8. S. Manganaris, M. Christensen, D. Serkle, and K.Hermix,,   "A Data Mining Analysis of RTID Alarms.
    View Artical

  9. Phurivit Sangkatsanee, Naruemon Wattanapongsakorn1
    View Artical

  10. Real-time Intrusion Detection and Classification",   King Mongkut?s University of Technology Thonburi
    View Artical

  11. Sophia Kaplantzis Nallasamy Mani,   "A STUDY ON CLASSIFICATION TECHNIQUES FOR NETWORK INTRUSION DETECTION
    View Artical

  12. Mrutyunjaya Panda, Manas Ranjan Patra,   "SOME CLUSTERING ALGORITHMS TO ENHANCE THE PERFORMANCE OF THE NETWORK INTRUSION DETECTION SYSTEM
    View Artical

  13. Qiang Wang Vasileios Megalooikonomou,   "A Clustering Algorithm for Intrusion Detection
    View Artical

  14. W. Lee and S. Stolfo,   "Data mining approaches for intrusion detection",   7th USENIX Security Symposium, San Antonio, TX   ,1998
    View Artical

  15. P. Dokas, L. Ertoz, V. Kumar, A. Lazarevic, J. Srivastava, and P.N.Tan,,   "Data mining for network intrusion detection",   NSF Workshop on Next Generation Data Mining   ,2002
    View Artical