Layered Approach & HMM for Network Based Intrusion Dection
Journal Title: International Journal of Modern Engineering Research (IJMER) - Year 2013, Vol 3, Issue 5
Abstract
In this, we are using two techniques together as signature based and anomaly based called as Hybrid technique. Anomaly detection, where the strategy is to suspect of what is considered an unusual activity for the subject (users, processes, etc.) and carry on further investigation. This approach is particularly effective against novel (i.e. previously unknown) attacks. Signature based detection systems detects previously known attack in a timely and efficient way. The main issue of this approach is that in order to detect an intrusion this must to be previously detected. This Hybrid technique gives better result than signature based and anomaly based technique. Also we are using here layered approach to get result faster ,because in layered approach we have different four layers as prob,U2R,R2L,DOS and we assigned different features to different layer so that if any layer find attack at that layer that attack will fix ,that attack should not go further. Main aim of this paper is to increase accuracy and efficiency .
Authors and Affiliations
Archana patil
Thinking of Programmed Instructional Design: Need of Today’s Learner
Abstract: This article stresses on adopting appropriate instructional design for providing learner, experiences and organizing teacher pupil activities which is crucial for effective use of curricular content an...
Development of a Integrated Air Cushioned Vehicle (Hovercraft)
The design and development of a hovercraft prototype with full hovercraft basic functions is reported by taking into consideration, size, material and component availability and intermediate fabrication skill....
Groundwater Quality Evaluation in Thal Doab of Indus Basin of Pakistan
Indus Basin is typical model of conjunctive use of surface and groundwater. A well transmissive continuous and deep alluvium Indus PlainAquifer (IPA)is underlain by world’s largest contiguous Indus Basin Irrigation Syste...
Two Stage Reversible Data Hiding Based On Image Interpolation and Histogram Modification
In this paper a two stage reversible data hiding technique is proposed. At the first stage, an interpolation technique is used to generate a cover image from the input image. The difference values from input image an...
Photovoltaic-Biomass Gasifier Hybrid Energy System for a Poultry House
Availability and sustainability of energy and food production are the biggest challenge facing the world. Find out how to integrate poultry and animal farms with renewable energy technologies will lead to a greater...