Computer Security and Intrusion detection System - A Data Mining Based Approach
Journal Title: International Journal of Scientific Research and Management - Year 2017, Vol 5, Issue 6
Abstract
With an increased understanding of how systems work, intruders have become skilled at determining weaknesses in systems and exploiting them to obtain such increased privileges that they can do anything on the system. Intruders also use patterns of intrusion that a re difficult to trace and identify. They frequently use several levels of indirection before breaking into target systems and rarely indulge in sudden bursts of suspicious or anomalous activity. They also cover their tracks so that their activity on the pe netrated system is not easily discovered. We must have measures in place to detect security breaches, i.e., identify intruder s and intrusions. Intrusion detection systems fill this role and usually form the last line of defense in the overall protection sc heme of a computer system. They are useful not only in detecting successful breaches of security, but also in monitoring attempts to br each security, which provides important information for timely countermeasures. This paper focused on how data mining is used for Intrusion detection Syste
Authors and Affiliations
Neetu Anand
THE MODERATING EFFECT OF ENVIRONEMENTAL FACTORS AND FIRM’S AGE ON STRATEGIC ORIENTATIONS AND PERFORMANCE OF INDIAN WOMEN ENTREPRENEURS
Strategic orientation has become a central concept in the domain of entrepreneurship that has received a substantial amount of theoretical and empirical attention..Many researchers have neglected to stu...
Performance evaluation for a unicast Non Delay Tolerant position based routing protocols in VANETs
Vehicular Ad hoc Network s are special kind of Mobile Ad Hoc Networks. VANET is an emerging technology, which enables an extensive range of applications, including road safety, passenger convenience, self - driven vehicl...
Design & Simulation of Rectangular & Circular Patch Antenna with Electromagnetic Band Gap Substrates
his paper presents the design and simulation of rectangular & circular patch antenna with Electromagnetic Band Gap Substrates (EBG) substrate using High Frequency Structure Simulator (HFSS). T...
Assessment Of Water Quality Using Multi - Variate Analysis,Water Quality Index And Geo - Statistical Analysis
The water quality is mostly characterized by many variables (parameters) which represent a water composition in specific local i ties and time. Real hydrological data are mostly noisy, it means that they are not normal...
Enhanced Scalability In Social Network Application Using Presence Service
Social network applications have become more and more in style on mobile devices. A mobile presence service is an important element of a social network application as a result of it maintains every mobile...