Data mining with Improved and efficient mechanism to detect the Vulnerabilities using intrusion detection system
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 2
Abstract
Intrusion detection system must be capable of known and unknown vulnerabilities. We already studied the previous problems which includes detection of known vulnerabilities and unknown vulnerabilities. In order to obtain good accuracy a relevant or efficient dataset should be there to detect the known attacks and unknown attacks. Therefore, there are numerous security systems and intrusion detection systems that address different aspects of computer security. In this research work we proposed an approach that is sequential multilevel misuse detection model with the fuzzy rules for the detection of known and unknown attacks on the efficient intrusion dataset either kdd dataset, Nsl-dataset, tcp dump etc. Empirical studies show not much performance or accuracy of detecting the known and unknown attacks. We discuss the generation of a misuse detection models from pure normal data, and also discuss the generation of sequential multilevel misuse detection models along with fuzzy rules from data that contains known classes. We apply the proposed approaches to network-based intrusions. And the simulation of results is implemented on the good platform
Authors and Affiliations
Awan Dhawan
SMART CARD BASED TOLL GATE AUTOMATED SYSTEM
: Smart cards are secure tokens that can provide security services to a wide range of applications. Along with other technology advances, smart card technology has changed dramatically as well. However, its communicati...
Routing Issues for Trust Based Framework in Mobile Ad Hoc Networks
The execution and survival of ad hoc networks depends on cooperative and trusting nature of the distributed nodes. There is a common assumption in the routing protocols that all nodes are trustworthy and cooperative....
Design of Wireless Monitor System Based On S3C2440 and GPRS
This Paper introduces a new type Wireless Monitoring System, which applied in Industrial Field. In the Proposed system, the main hardware includes the S3C2440 Microcontroller based on ARM9 core, and the software adop...
An Efficient Face Recognition under Varying Image Conditions
Performance of the face verification system depends on many conditions. One of the most problematic is varying illumination condition. Making recognition more reliable under uncontrolled lighting conditions is one...
Signal Delay Control Based on Different Switching Techniques in Optical Routed Interconnection Signal Delay Control Based on Different Switching Techniques in Optical Routed Interconnection Networks
This paper has investigated the different switching techniques to reduce signal latency for different optical interconnection network architectures that provide sufficient quality of service (QoS) and are suitable fo...