Detecting intruders in the network using machine learning classifier
Journal Title: Elysium Journal of Engineering Research and Management - Year 2016, Vol 6, Issue 2
Abstract
Rapid development in technology has raised the need for an effective intrusion detection system as the traditional intrusion detection method cannot compete against newly advanced intrusions. In the proposed work uses machine learning technique to detect both known and unknown attacks in the payload analysis of network traffic. As the majority of such systems, the proposal consists of two phases: a training phase and a detection phase. During the training phase the statistical model of the legitimate network usage is created through Bloom Filters and N-grams techniques. Subsequently, the results obtained by analyzing a dataset of attacks are compared with such model. This will allow a set of rules to be developed which will be able to detect whether the packets contain malware payloads. In the detection phase, the traffic is to analyze compared with the model created in the training phase and the results obtained when applying rules.
Authors and Affiliations
Nivedita S, Revathi. M. P
IMPLEMENTATION OF HIGHLY SECURED H.264/AVC BIT-STREAMS USING CORRELATED MOTION (CM) ESTIMATION FOR HIGH VIDEO QUALITY OF SERVICE (QOS)
Quality of Service (QoS) is the important criteria in the video processing in H.264/AVC Bit-streams. In this paper, the encryption based bit streams transmitted to improve the security of the bit strea...
A SURVEY ON UNIFIED COMMUNICATION
In recent years, unified communication is becoming a critical part in enterprise communication. Voice, messaging, conferencing, presence and availability, and directories have all become fundamental requirements...
MRF PRETREADS SERVICE MANAGEMENT AND APPLICATION
The project is entitled “MRF Pretreds Service Management and Application” Is Done For The Company Named “MRF Pretreads” which is an effective tyre service management. The project work is done...
IMPROVING SECURITY AND DEDUPLICATION FOR OUTSOURCED DATABASE IN CLOUD COMPUTING
To improve the security of data by using Elliptic Curve Cryptography (ECC) Algorithm. The duplicated data will be detected and avoid with a Secure Hash Algorithm (SHA). In many case when the dishonest Cloud Service Provi...
ROLE OF HUMAN RESOURCES DEPARTMENT IN CORPORATE GOVERNANCE/ CORPORATE SOCIAL RESPONSIBILITY
The terms “Corporate governance” is a new buzzword of the 21P st P century. In fact the word “governance” is used for addressing all the issues. Generally the word “governance” is used for governing the country or a stat...