Intrusion Detection Systems By Anamoly-Based Using Neural Network
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1
Abstract
To improve network security different steps has been taken as size and importance of the network has increases day by day. Then chances of a network attacks increases Network is mainly attacked by some intrusions that are identified by network intrusion detection system. These intrusions are mainly present in data packets and each packet has to scan for its detection. This paper works to develop a intrusion detection system which utilizes the identity and signature of the intrusion for identifying different kinds of intrusions. As network intrusion detection system need to be efficient enough that chance of false alarm generation should be less, which means identifying as a intrusion but actually it is not an intrusion. Result obtained after analyzing this system is quite good enough that nearly 90% of true alarms are generated. It detect intrusion for various services like Dos, SSH, etc by neural network
Authors and Affiliations
Shahul Kshirsagar PG
The Importance of Object-Oriented Programming in This Era of Mobile Application Development
Abstract: In the past two decades object oriented programming has become the dominant programming OOP paradigm used by application developers. Object oriented programming scales very well, from the most trivial of proble...
Removing Atmospheric Turbulence Using Restoration Algorithm
Abstract: It remains a challenge to simultaneously remove geometric distortion and space-time-varying blur in frames captured through a turbulent atmospheric medium. To solve, or to reduce these effects, we propose...
Intelligent Fault Identification System for Transmission Lines Using Artificial Neural Network
Transmission and distribution lines are vital links between generating units and consumers. They are exposed to atmosphere, hence chances of occurrence of fault in transmission line is very high, which has to be...
ncremental Mining of Sequential Patterns Using Weights
Real life sequential databases are usually not static. They tend to grow incrementally. So after every update a frequent pattern may no longer remains frequent while some infrequent patterns may appear as frequen...
A Survey on Different Levels of Risks during Different Phases in Data Warehouse
Abstract: The term Data Warehouse represents huge collection of historical data which are subject-oriented, non-volatile, integrated, and time-variant and such data is required for the business needs [1]. Data warehouses...