A Variation of Layered STRIFA Pattern Matching for Intrusion Detection
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 3
Abstract
[sub][/sub]Abstract: Intrusion Detection System (IDS) is an effective security tool that helps to prevent unauthorized access to network resources by analyzing the network traffic and classifying the records as either normal or anomalous. Developing rules manually through incorporation of attack signatures are used in the detection of attacks. Finite State Automata (FSA) are used by many network processing applications to match complex sets of regular expressions in network packets. In order to make FSA-based matching possible even at the ever increasing speed of modern networks, multistriding has been introduced. Stride finite automata (StriFA) a new family of finite automata, is to accelerate both string matching and regular expression matching with reduced memory consumption. To increase the efficiency of StriFA, a layered approach of attack detection by using KDD 99 DARPAdataset is integrated with StriFA. We have converted symbolic named attributes with integer values in the dataset. This increases the accuracy rate and greatly reduces the error rate
Authors and Affiliations
T. S. Urmila , Dr. R. Balasubramanian
Dynamic Query Form with query Refinement and Database encryption
Abstract: In the present circumstances real world databases contain thousands of attributes and relations. Access the information from this corpulent database is a nontrivial task and is an exploring area. Queries...
A Secured Agent-Based Framework for Data Warehouse Management
Managing data warehouses (DWs) is typically characterized by intensive data processing and protracted activities which usually degrade performance. Moreover, DWs are usually designed with the overall objective...
A Study On Diffie Hellman Algorithm And Elliptic Curve Cryptography
Cryptography is the vast discipline to provide security at a greater level for our information. The Diffie Hellman (DH)Algorithm and Elliptic Currve Cryptography(ECC) are two different approaches to provide unique key. U...
A Novel Implementation of Chiral Structure in Computer Honeycomb Diamond Networks Topology
Abstract: This project deals with the efficiency of the Chiral structure in Honeycomb Diamond network. Honeycomb and diamond networks have been proposed as alternatives to mesh and torus architectures for parallel proces...
A Survey Report on Distributed System Using Load Balancing Approach
Abstract:A number of load balancing algorithm were developed in order to improve the execution of a distributed application in any kind of distributed architecture. Load balancing involves assigning tasks to each process...