Detecting intruders in the network using machine learning classifier
Journal Title: Elysium Journal of Engineering Research and Management - Year 2016, Vol 6, Issue 2
Abstract
Rapid development in technology has raised the need for an effective intrusion detection system as the traditional intrusion detection method cannot compete against newly advanced intrusions. In the proposed work uses machine learning technique to detect both known and unknown attacks in the payload analysis of network traffic. As the majority of such systems, the proposal consists of two phases: a training phase and a detection phase. During the training phase the statistical model of the legitimate network usage is created through Bloom Filters and N-grams techniques. Subsequently, the results obtained by analyzing a dataset of attacks are compared with such model. This will allow a set of rules to be developed which will be able to detect whether the packets contain malware payloads. In the detection phase, the traffic is to analyze compared with the model created in the training phase and the results obtained when applying rules.
Authors and Affiliations
Nivedita S, Revathi. M. P
BRAIN TUMOR IMAGE SEGMENTATION USING INTELLIGENT MEAN SHIFT CLUSTERING TECHNIQUE
Brain tumor is a deadly disease which challenges on detecting tumor cells. The tumor detection becomes more complicated for diagnosis as it exhibits complex characteristics. To address this pr...
AN EFFICIENT DAUBECHIES COMPLEX WAVELET BASED MULTI-RESOLUTION APPROACH FOR MULTIMODAL MEDICAL IMAGE FUSION
Multimodality approach for medical images provides multiple advantages for the detection, diagnosis and management of the diseases. Image fusion techniques are used to combine the high resolution images with...
A PROBABILISTIC APPROACH FOR PREDICTING ANOMALIES IN SOCIAL STREAMS
Basic presumption is that a new (emerging) topic is something people feel like discussing, commenting, or forwarding the information further to their friends. The proposed approach, spot the emergence of topics in a soci...
SURVEY AND ANALYSIS ON DATA SECURITY ISSUES FOR USERS EXERCISING CLOUD
Iaas provides access to computing resource over virtualized environment, “the Cloud”, across a public connection, usually the internet. Computing resources means the virtual server space, network conne...
Similarity Measurement Of Web Navigation Pattern Using K-Harmonic Mean Algorithm
we present a new method to improve the web Navigation Usage Pattern to discover the web data based on similarity between two cluster points. The web usage patterns can be extracted from Web server logs regularly verified...