A Survey of Techniques for Intrusion Detection System
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 10
Abstract
In this paper we will discuss the various kinds of anomalous and malicious activities, which can be a symptoms of Intrusion. The term Intrusion detection was coined in 1980. Since then many Frameworks for Intrusion Detection were proposed and executed successfully. But, day by day attackers come-up with new ideas, and with them, the field of Intrusion detection should also update in the technologies and methods of detecting Intrusions in the network. So, in this paper we will discuss about various frameworks or methods which were proposed by researchers, and their use and effectiveness in the field of Intrusion Detection. To detect Intrusion in the network we required a distributed approach which is a kind of using small independent entities, called as Agents, to detect these anomalous or malicious behaviors. Along with this the different data mining methods and algorithms are also used in Intrusion Detection.
Authors and Affiliations
Mr. Rahul Chinchore, Prof. S. S. Sambare
Financial Markets Prediction Using Quantitative Analysis (FMPQA)
Unlimited trade pressures forced the fiscal security organizations to explore the possibilities of information technology with the support of data mining technique. Now a days unbiased volume of trades in the markets...
Loading Balance of Distribution Feeders With Loop Power Controllers In Centralised And PV Based Decentralised Power Generation Systems
For effective operation of distribution system , balanced loading on distribution feeders is very important. It mitigates power flow overloading and reduces power losses. In this paper, LOOP POWER CONTROLLER(LPC) is...
Detection of Brain Tumor Using PCA With SVM
In the field of medical image processing, detection of brain tumor from magnetic resonance image (MRI) brain scan has become one of the most active research. Detection of the tumor is the main objective of the system...
Security Enhancement in Mobile Ad hoc Networks using Non-zero Non-cooperative Game Theory
Mobile Ad hoc Network (MANET) is a multi hop infrastructure less wireless networks which offers unrestricted mobility. As wireless ad-hoc networks lack a centralized infrastructure, they are exposed to a lot of attac...
Securing a Network by Modeling and Containment of Worms Using Preference Scanning
Self-propagating codes, called worms. In this paper, we present an inclination branching process model for characterizing the propagation of Internet worms. Basically user knows the name and the definition of worms, b...