Downloads: 15 | Views: 219 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3
Informative Article | Computer Science | India | Volume 12 Issue 11, November 2023 | Popularity: 6.5 / 10
Effective Impact of Intrusion Detection System for Manufacturing Industries Using Data Mining Techniques: A Comprehensive Study
Dr. T. A. Ashok Kumar
Abstract: Intrusion detection systems are systems designed to monitor computer and network activities for security violations. These activities are observed by scrutinizing the audit data generated by the operating system or some other application programs running on the computer manufacturing industries have witnessed significant advancements in automation and connectivity, resulting in the proliferation of interconnected systems and devices. While this has increased efficiency and productivity, it has also exposed these industries to a growing risk of cyber-attacks and intrusions. Intrusion Detection Systems (IDS) play a crucial role in safeguarding manufacturing systems from unauthorized access and malicious activities. This paper presents an investigation into the use of data mining techniques to enhance the effectiveness of Intrusion Detection Systems in the context of manufacturing industries. Manufacturing environments are characterized by complex and heterogeneous data sources, making traditional rule-based IDS less effective in identifying novel and sophisticated attacks. Examples of security violations include the abuse of privileges or the use of attacks to exploit software or protocol vulnerabilities. Data mining techniques, such as machine learning algorithms and anomaly detection methods, offer the potential to address this challenge by learning from historical data and detecting previously unseen threats. This study explores the various data sources in manufacturing, including sensor data, network logs, and process data, and demonstrates how these can be integrated into a comprehensive IDS. The proposed approach is validated using real-world datasets and experimental results, showcasing its ability to effectively detect intrusions and anomalies in manufacturing systems. The integration of data mining techniques not only improves the accuracy of intrusion detection but also reduces false positives and enhances the adaptability of IDS to evolving threats.
Keywords: Data Mining, Knowledge discovery, Intrusion systems, Propagation, Data Warehousing, ADAM, neural network, MADAM, firewall network, Intrusion Detection Systems, Manufacturing Treats, Cyber-Attacks, Cyber-Threats, Cyber Security, Clustering Algorithms
Edition: Volume 12 Issue 11, November 2023
Pages: 614 - 618
DOI: https://www.doi.org/10.21275/SR231106195150
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 408 | Views: 989 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3
Computer Science, India, Volume 9 Issue 4, April 2020
Pages: 645 - 648Crop Yield Prediction Using Machine Learning
Mayank Champaneri, Darpan Chachpara, Chaitanya Chandvidkar, Mansing Rathod
Downloads: 234 | Views: 417 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3
Computer Science, India, Volume 9 Issue 3, March 2020
Pages: 1606 - 1612Analysis of the Technique for Disaster Recovery in Cloud Computing Environment
B. Bamleshwar Rao, Dr. Akhilesh A. Waoo
Downloads: 229 | Views: 369 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3
Computer Science, Bangladesh, Volume 9 Issue 3, March 2020
Pages: 1368 - 1375Design and Development of an E-Commerce System in a Rapid Organized Way
Ahmed Yunus, Md Masum
Downloads: 202 | Views: 587 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3
Computer Science, United States of America, Volume 9 Issue 9, September 2020
Pages: 1095 - 1100Maintaining Social Distancing using Artificial Intelligence
Krish Chaudhary
Downloads: 200 | Views: 384 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3
Computer Science, Iraq, Volume 9 Issue 3, March 2020
Pages: 286 - 291DNA-Chaos S-Box Generation for Modified Lightweight AES Algorithm for Data Packet Protection in MANET
Muntaha A. Hatem, Haider K. Hoomod