An Adaptive Log Based Realtime Network Scans in LAN

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2013, Vol 5, Issue 5

Abstract

Network scans really are a common initial step within a network intrusion attempt. As a way to gain details about a possible network intrusion, it can be beneficial to analyze these network scans. Scanning activity is naturally a common activity over the internet today, representing malicious activity such as information gathering by the motivated adversary or automated tool on the lookout for vulnerable hosts (e.g., worms). Many scan detection techniques have been developed; however, their focus has been on smaller networks where packet-level information is available, or where internal characteristics of this very network have been observed. Existing approaches use scan detection technique as a way to identify of packet-level data between host pairs, and activities are identified by grouping sessions based on patterns inside the kinds of session, the IP addresses, plus the ports. For serious networks, which can include those of ISPs, large corporations or government organizations, people's information might not be available. Existing model offers a model of scans which can be used given only unidirectional flow data. Novel classification of scan detection methods based upon their network policy, since attackers usually takes benefit for such policies to evade detection. The intention of the proposed program is to analyze sample network traces to discover and classify properties of port scans using robust Probabilistic technique. Finally scan detection accuracy can possibly be analyzed by employing logistic regression approach that is used to model the post that informs a user if a scan is present. Experimental results will provides insight into Internet traffic by classifying known activities, giving visibility to threats to the network through scan detection, which correspondingly extending understanding of the activities occurring on the network.

Authors and Affiliations

Puli Lakshmana Swami , Neela Surendrababu

Keywords

Related Articles

A Presumption Mold of Visual Cryptography Design with Dynamic Groups

Visual cryptography is a secret sharing scheme where an image is encoded into transparencies. The Secret information can be revealed from the encoded image only when the correct set of images is given as an input and if...

Analyzing the Road Traffic and Accidents with Classification Techniques

Data mining is the process of extracting data’s from the database engines. Now a days the road traffic and accidents are main area for the researchers to discover the new problems behind that. It is commonly used in a ma...

Natural Radioactivity Measurements in different regions in Najaf city, Iraq

This study measures the activity of 238U, 232Th, and 40K. The soil samples collected from different sites in Najaf city, Iraq. The studied samples were analyzed and the concentrations of radionuclides were determined usi...

A Privacy Preserving of Composite Private/Public Key in Cloud Servers

Security is a term used to provide secrecy of data from the illegal entries. It is used to prevent a user that he/she should not have access to. It is a two step process. The security system in the first step identifies...

Analysis of Email Fraud Detection Using WEKA Tool

Data mining is also being useful to give solutions for invasion finding and auditing. While data mining has several applications in protection, there are also serious privacy fears. Because of email mining, even inexperi...

Download PDF file
  • EP ID EP151863
  • DOI -
  • Views 127
  • Downloads 0

How To Cite

Puli Lakshmana Swami, Neela Surendrababu (2013). An Adaptive Log Based Realtime Network Scans in LAN. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 5(5), 262-267. https://europub.co.uk/articles/-A-151863