Design of Trust Model For Efficient Cyber Attack Detection on Fuzzified Large Data using Data Mining techniques
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 3
Abstract
Recently Network Intrusion Detection System (IDS), is being used as the main security defending technique. It is second guard for a network after firewall. Various approaches from data mining to soft computing fields have been used for detecting the misuse and anomaly attacks from the network. A significant challenge in providing an effective defense mechanism to a network perimeter is having the ability to detect intrusions and implement countermeasures. Components of the network perimeter defense capable of detecting intrusions are referred to as Intrusion Detection Systems (IDS). In this paper after studying the research done in the field we proposed a model in which first dimension reduction technique is applied. Secondly on reduced data set fuzzification of feature values is done to get simpler range. Thirdly combination of clustering and naïve based approach ,on the large test dataset applied. Obtained results are analyzed on detection rate, False positive rate and precision rate. Fuzzy logic based discretization of the dataset has helped to improve the training data representation, and performs well in terms of detecting attacks faster and with reasonable reduction in false alarm rate.
Authors and Affiliations
Vineet Richharya, Dr. J. L Rana, Dr. RC Jain, Dr. K K Pandey
Applications of Graph Labeling in Major Areas of Computer Science
The field of Graph Theory plays a vital role in various fields. In Graph theory main problem is graph labeling. Graph Labeling is the assignment of integer’s form 1 to n for vertex, edges and both of the graphs respec...
Short Term Load Forecasting OF 132/33Kv Maiduguri Transmission Substation Using Artificial Neural Network (ANN)
This paper presents a novel approach for 1 to 24 hours ahead load forecasting using multilayer perceptron (MLP) also referred to as multilayer feed forward artificial neural network (ANN) of a utility company located...
Learning Analytics for Large Scale Web Information Using Twitter
Amid sudden onset emergency occasions, the vicinity of spam, bits of gossip and fake substance on Twitter diminishes the estimation of data contained on its messages (or "tweets"). A conceivable answer for this issue is...
Efficient Energy Management System Through RTOS
This paper describes efficient energy management system to reduce and manage power consumption in home area. The room easily controllable with an RF remote control of a home device and manage through RTOS. The room h...
Using Conventional MMQA To Automatically Annotate Media Entities
It is worth stating that already exist several research efforts enthusiastic to automatically answering questions with multimedia data i.e. the so-called Multimedia Question Answering (MMQA). But these approaches gen...