Computer Security and Intrusion detection System - A Data Mining Based Approach
Journal Title: International Journal of Scientific Research and Management - Year 2017, Vol 5, Issue 6
Abstract
With an increased understanding of how systems work, intruders have become skilled at determining weaknesses in systems and exploiting them to obtain such increased privileges that they can do anything on the system. Intruders also use patterns of intrusion that a re difficult to trace and identify. They frequently use several levels of indirection before breaking into target systems and rarely indulge in sudden bursts of suspicious or anomalous activity. They also cover their tracks so that their activity on the pe netrated system is not easily discovered. We must have measures in place to detect security breaches, i.e., identify intruder s and intrusions. Intrusion detection systems fill this role and usually form the last line of defense in the overall protection sc heme of a computer system. They are useful not only in detecting successful breaches of security, but also in monitoring attempts to br each security, which provides important information for timely countermeasures. This paper focused on how data mining is used for Intrusion detection Syste
Authors and Affiliations
Neetu Anand
Vehicle - To - Vehicle Communication : Traffic Safety Over RF Communication
Vehicle - to Vehicle Communication is the type of communication which provides communication among nearby vehicles for improving and reducing traffic. Traffic is increasing day by day and still we cannot s...
Efficacy of 1% metronidazole gel in facial seborrhic dermatitis: A double blind study
Background: Seborrhic dermatitis, also known as seborrhic eczema is a common inflammatory disease of the skin, occurring in 2 - 5% of the population. It is characterized by erythematous plaque that is covere...
Healthcare Conflicts: Resolution Mode Choices of Doctors & Nurses in a Tertiary Care Teaching Institute
Conflict begins when one party perceives that another party has negatively affected, or is about to affect negatively, something that the first party cares about. For decades hospitals and other healthcare...
A Survey on Pattern Recognition Techniques
Pattern Recognition is a process which recognizes a pattern using a machine or computer. Pattern recognition techniq ues are concerned with the theory and algorithms of putting abstract objects, e.g., measu...
Teaching Materials Developments for Digital Native Students
The total quality management had raised the further question aboutchangingin classroom activities.TheFurther development this idea will determine that human factors take role in total quality management,especially in dev...