International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 15 | Views: 219 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3

Informative Article | Computer Science | India | Volume 12 Issue 11, November 2023 | Popularity: 6.5 / 10


     

Effective Impact of Intrusion Detection System for Manufacturing Industries Using Data Mining Techniques: A Comprehensive Study

Dr. T. A. Ashok Kumar


Abstract: Intrusion detection systems are systems designed to monitor computer and network activities for security violations. These activities are observed by scrutinizing the audit data generated by the operating system or some other application programs running on the computer manufacturing industries have witnessed significant advancements in automation and connectivity, resulting in the proliferation of interconnected systems and devices. While this has increased efficiency and productivity, it has also exposed these industries to a growing risk of cyber-attacks and intrusions. Intrusion Detection Systems (IDS) play a crucial role in safeguarding manufacturing systems from unauthorized access and malicious activities. This paper presents an investigation into the use of data mining techniques to enhance the effectiveness of Intrusion Detection Systems in the context of manufacturing industries. Manufacturing environments are characterized by complex and heterogeneous data sources, making traditional rule-based IDS less effective in identifying novel and sophisticated attacks. Examples of security violations include the abuse of privileges or the use of attacks to exploit software or protocol vulnerabilities. Data mining techniques, such as machine learning algorithms and anomaly detection methods, offer the potential to address this challenge by learning from historical data and detecting previously unseen threats. This study explores the various data sources in manufacturing, including sensor data, network logs, and process data, and demonstrates how these can be integrated into a comprehensive IDS. The proposed approach is validated using real-world datasets and experimental results, showcasing its ability to effectively detect intrusions and anomalies in manufacturing systems. The integration of data mining techniques not only improves the accuracy of intrusion detection but also reduces false positives and enhances the adaptability of IDS to evolving threats.


Keywords: Data Mining, Knowledge discovery, Intrusion systems, Propagation, Data Warehousing, ADAM, neural network, MADAM, firewall network, Intrusion Detection Systems, Manufacturing Treats, Cyber-Attacks, Cyber-Threats, Cyber Security, Clustering Algorithms


Edition: Volume 12 Issue 11, November 2023


Pages: 614 - 618


DOI: https://www.doi.org/10.21275/SR231106195150



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Dr. T. A. Ashok Kumar, "Effective Impact of Intrusion Detection System for Manufacturing Industries Using Data Mining Techniques: A Comprehensive Study", International Journal of Science and Research (IJSR), Volume 12 Issue 11, November 2023, pp. 614-618, URL: https://www.ijsr.net/getabstract.php?paperid=SR231106195150, DOI: https://www.doi.org/10.21275/SR231106195150



Downloads: 408 | Views: 989 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3

Computer Science, India, Volume 9 Issue 4, April 2020

Pages: 645 - 648

Crop Yield Prediction Using Machine Learning

Mayank Champaneri, Darpan Chachpara, Chaitanya Chandvidkar, Mansing Rathod


Downloads: 234 | Views: 417 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3

Computer Science, India, Volume 9 Issue 3, March 2020

Pages: 1606 - 1612

Analysis of the Technique for Disaster Recovery in Cloud Computing Environment

B. Bamleshwar Rao, Dr. Akhilesh A. Waoo


Downloads: 229 | Views: 369 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3

Computer Science, Bangladesh, Volume 9 Issue 3, March 2020

Pages: 1368 - 1375

Design and Development of an E-Commerce System in a Rapid Organized Way

Ahmed Yunus, Md Masum


Downloads: 202 | Views: 587 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3

Computer Science, United States of America, Volume 9 Issue 9, September 2020

Pages: 1095 - 1100

Maintaining Social Distancing using Artificial Intelligence

Krish Chaudhary


Downloads: 200 | Views: 384 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3

Computer Science, Iraq, Volume 9 Issue 3, March 2020

Pages: 286 - 291

DNA-Chaos S-Box Generation for Modified Lightweight AES Algorithm for Data Packet Protection in MANET

Muntaha A. Hatem, Haider K. Hoomod


Top