Design of Trust Model For Efficient Cyber Attack Detection on Fuzzified Large Data using Data Mining techniques
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 3
Abstract
Recently Network Intrusion Detection System (IDS), is being used as the main security defending technique. It is second guard for a network after firewall. Various approaches from data mining to soft computing fields have been used for detecting the misuse and anomaly attacks from the network. A significant challenge in providing an effective defense mechanism to a network perimeter is having the ability to detect intrusions and implement countermeasures. Components of the network perimeter defense capable of detecting intrusions are referred to as Intrusion Detection Systems (IDS). In this paper after studying the research done in the field we proposed a model in which first dimension reduction technique is applied. Secondly on reduced data set fuzzification of feature values is done to get simpler range. Thirdly combination of clustering and naïve based approach ,on the large test dataset applied. Obtained results are analyzed on detection rate, False positive rate and precision rate. Fuzzy logic based discretization of the dataset has helped to improve the training data representation, and performs well in terms of detecting attacks faster and with reasonable reduction in false alarm rate.
Authors and Affiliations
Vineet Richharya, Dr. J. L Rana, Dr. RC Jain, Dr. K K Pandey
Advanced Home Security System.
Domestic security recently has started making a significant mark in the life of people throughout the globe. And hence more and more advanced systems are developed each day to enhance domestic security. But most of t...
Detection of Precise C/C++ Memory Leakage by diagnosing Heap dumps using Inter procedural Flow Analysis statistics
Memory leak is a time consuming bug often created by C++ developers. Detection of memory leaks is often tedious. Things get worst if the code is not written by you, or if the code base is quite huge. The most difficu...
Mobile Cloud Computing: A Emerging Technology, Its Advantages and Issues
In spite of great advances in the mobile devices as a computing platform, applications is still very limited due to the poor computing capability of mobile devices and limited battery life. In order to overcome these...
A Study on Jamming and Wormhole Attacks in Wireless Mesh Network
Wireless Mesh Networks (WMNs) is a network ,where data is transmitted using mesh networking. It is an arising technology in recent days due to its simple installation, low cost ,self connectivity of nodes ,flexibility a...
Enhancement of Power Quality in Multi Feeders by using MC-DPFC
According to growth of electricity demand and the increased number of non-linear loads in power grids, providing a high quality electrical power should be considered. In this paper, voltage sag and swell of the power...