Data Mining Techniques for Network Intrusion Detection and Prevention Systems
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2016, Vol 4, Issue 6
Abstract
The main purpose of Intrusion Detection Systems(IDS) and Intrusion protection Systems(IPS) for data mining is to discover patterns of program and user activity, and determine what set of events indicate an attack. In the last years, the networking revolution has finally come of age. More than ever before, we see that the Internet is changing computing as we know it. The possibilities and opportunities are limitless; unfortunately, so too are the risks and chances of malicious intrusions. In Network Security, intrusion detection and prevention system is the act of detecting activity or action that attempt to compromise the confidentiality, integrity or availability of a resource. Intrusion prevention techniques, such as user authentication avoiding programming errors, and information protection (e.g., encryption) have been used to protect computer systems is act as first line of defense. We focus on issues related to deploying a data mining-based IDS in a real time of networking environment. To improve accuracy and security, data mining programs are used to analyze audit data and extract features that can distinguish normal activities from intrusions. In this paper presents an intrusion detection system architecture consisting of network sensors, detectors, a data warehouse, and model generation components and we can identify network attack and which type of attack on databases being take place.
Authors and Affiliations
Nareshkumar D. Harale, Dr. B. B. Meshram
Optimization and Analysis of Drive Shaft Using CAE Tools
Drive shaft or propeller shaft is the essential part of Automobiles. It is used to deliver torque from transmission to the differential and further to the wheel to cause the motion of the vehicle. The drive shaft is used...
Cloud Learning For Virtual Campus
Taking in mind the growing Cloud Computing technology in every field including education and it’s becoming an adoptable technology for many of the organizations with its dynamic scalability and usage of virtualized resou...
A Novel Healthcare Application for Hospital Bed Booking System
With the increasing need for more better way to consume a service during the Covid-19 pandemic, as well as the need of more flexible way to register for the beds in the hospitals, this paper introduces a Web Application...
An Overview on Online Education
As blended and online learning grow less common education, instructors must rethink fundamental issues such as educating, learning, and assessment in unconventional settings. Such concerns include knowing how formative a...
Analysis of Cyber Security Threats Using Machine Learning Techniques
Nowadays malware detection is a problem that researchers have tried to solve for so many years by using enormous type of methods. The behaviors of two given malware variants remain similar, although their signatures coul...