Data mining with Improved and efficient mechanism to detect the Vulnerabilities using intrusion detection system 

Abstract

Intrusion detection system must be capable of known and unknown vulnerabilities. We already studied the previous problems which includes detection of known vulnerabilities and unknown vulnerabilities. In order to obtain good accuracy a relevant or efficient dataset should be there to detect the known attacks and unknown attacks. Therefore, there are numerous security systems and intrusion detection systems that address different aspects of computer security. In this research work we proposed an approach that is sequential multilevel misuse detection model with the fuzzy rules for the detection of known and unknown attacks on the efficient intrusion dataset either kdd dataset, Nsl-dataset, tcp dump etc. Empirical studies show not much performance or accuracy of detecting the known and unknown attacks. We discuss the generation of a misuse detection models from pure normal data, and also discuss the generation of sequential multilevel misuse detection models along with fuzzy rules from data that contains known classes. We apply the proposed approaches to network-based intrusions. And the simulation of results is implemented on the good platform 

Authors and Affiliations

Awan Dhawan

Keywords

Related Articles

Improving authentication mechanism for using extended public key cryptography in mobile adhoc network  

Mobile ad hoc network is a special kind of wireless networks formed without any centralized administration. It is a collection of mobile nodes without having aid of establish infrastructure. In mobile ad hoc networ...

NEURAL NETWORK BASED MATCHING APPROACH FOR IRIS RECOGNITION 

Iris recognition has been considered as one of the most reliable biometrics technologies in recent years due to its high reliability in person identification. In this paper, an iris recognition system has been...

A Novel Approach of Using Laplacian Image Enhancement

Contrast enhancement based on multiscale decomposition of images has been proven to be a far versatile and efficient method than other regular techniques. We present here contrast image enhancement by using Laplacian Pyr...

Comparative analysis between PCA and Fast ICA based Denoising of CFA Images for Single-Sensor Digital Cameras. 

Denoising of natural images is the fundamental and challenging research problem of Image processing. This problem appears to be very simple however that is not so when considered under practical situations, where the typ...

Position based Routing Protocols for Wireless Ad hoc Networks: A Critical Survey

A Mobile Ad-hoc Network is a collection of wireless nodes that cooperatively form a network in the absence of any infrastructure or administration. In this paper we present an overview of position based routing protocols...

Download PDF file
  • EP ID EP125818
  • DOI -
  • Views 97
  • Downloads 0

How To Cite

Awan Dhawan (2013). Data mining with Improved and efficient mechanism to detect the Vulnerabilities using intrusion detection system . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 2(2), 787-791. https://europub.co.uk/articles/-A-125818