IMPROVING USER - TO - ROOT AND REMOTE - TO - LOCAL ATTACKS USING GROWING HIERARCHICAL SELF ORGANIZING MAP
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 4, Issue 6
Abstract
Intrusion Detection System (IDS) protects a system by detecting “known” as well as “unknown” attacks and generates the alert for suspicious activities in the traffic. There are various approaches for IDS, but our survey was focused on IDS using Self Organi zing Map (SOM). Our survey shows that the existing IDS based on Self Organizing Map (SOM) have more computational time and poor detection rate for User - to - Root (U2R) and Remote - to - Local (R2L) attacks. So, our objective is to improve the detection rate of U2R and R2L attacks along with low computational time. From our survey we found that, Growing Hierarchical Self Organizing Map (GHSOM) is efficient due to its low computation time compared to traditional SOM model. To achieve our objective, our model uses GHSOM algorithm along with proper features selection to improve the performance of U2R and R2L attacks. Our empirical result indicates that, there is nearby 75% increase in the detection rate of U2R and R2L attacks by using GHSOM approach compare to SOM ap proach
Authors and Affiliations
KrutiChoksi , Bhavin Shah , Ompriya Kale
AN EFFICIENT REVERSE CONVERTER DESIGN VIA PARALLEL PREFIX ADDER
In this paper, the implementation of residue number system reverse converters based on hybrid parallel prefix adders is analyzed. The parallel prefix adder provides high speed and reduced delay arithmetic operations bu...
MODELLING AND CONTROL FOR COMPOSITION OF NON-ISOTHERMAL CSTR BY USING FUZZY
As a matter of fact, several chemical or petrochemical industries are still using the old technology which are conventional control; one of it is PID controller. PID controller stills had a lot of weaknesses t...
An Image Steganography Technique with High Hiding Capacity Based On 24 Bit Color Image
Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular becaus...
Research on Friendly ARM Board for Data Transfer between Two USB Devices without Computer
The project aims to develop a device that allows file transfers between two USB memory devices without the need for a personal Computer. It is designed as a standalone application which allows for the backup of fi...
Performance Enhancement of Household Refrigerators with Cooling of Compressor: A Review
This paper presents a review of experimental tests carried out to investigate the performance of a household refrigerator. The purpose of this review paper is to summarize the important published papers on the enh...