@inproceedings{092bf16ab4ed4bcd927bf8d1197f1bf7,
title = "Intrusion detection based on data mining",
abstract = "In this article we discuss our research in developing general and systematic methods for intrusion detection. The key ideas are to use data mining techniques to discover consistent and useful patterns of system features that describe program and user behavior, and use the set of relevant system features to compute (inductively learned) classifiers that can recognize anomalies and known intrusions. The paper also discusses the current level of computer security development in Tanzania with particular interest in IDS application with the fact that approach is easy to implement with less complexity to computer systems architecture, less dependence on operating environment (as compared with other security-based systems) and ability to detect abuse of user privileges easily. The findings are geared towards developing security infrastructure and providing ICT services.",
keywords = "Computer security, Data mining, ICT, Intusion detection, Security",
author = "Oreku, {George S.} and Mtenzi, {Fredrick J.}",
year = "2009",
doi = "10.1109/DASC.2009.56",
language = "English",
isbn = "9780769539294",
series = "8th IEEE International Symposium on Dependable, Autonomic and Secure Computing, DASC 2009",
pages = "696--701",
booktitle = "8th IEEE International Symposium on Dependable, Autonomic and Secure Computing, DASC 2009",
note = "8th IEEE International Symposium on Dependable, Autonomic and Secure Computing, DASC 2009 ; Conference date: 12-12-2009 Through 14-12-2009",
}