Intrusion Detection System with Data Stream Modeling using Conditional Privileges
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2012, Vol 3, Issue 7
Abstract
IDS for computer network is capable of detecting and alerting the systems administrator on potential intrusion, providing guidance against any potential loss of integrity and confidentiality to the enterprise’s valuable intellectual assets. In this paper, the layered model for IDS and alert aggregation technique is used. In this layered IDS architecture, each layer assesses, filters, and/or aggregates information produced by a lower layer. Thus, relevant information gets more and more condensed and certain, and, therefore, also more valuable. Alert may originate from low-level IDS such as those mentioned above, from firewalls (FW), etc. Alerts that belong to one attack instance must be clustered together and meta-alerts must be generated. The main goal is to improve performance by reducing the amount of alerts substantially without losing any important information which is necessary to identify ongoing attack instances.
Authors and Affiliations
Ravindra Bhat
Reduce Energy Consumption in WSN Using Nature Stimulated Technique
Wireless sensor networks, sometimes called wireless sensor and actuator networks. Wireless Sensor Network comprise of the nodes operated by the batteries. These nodes are generally deployed in human inaccessible areas to...
Enhancement in Predictive Model for Insurance Underwriting
Underwriting is the most important process of a business where a slight miscue can lead to blunders. An insurance organization’s success depends upon the correct assessment of the possible risks associated with each appl...
Simulation of Gray Hole Attack in Adhoc Network Using NS2
A Wireless ad-hoc network is a short-lived network set up by wireless mobile computers or nodes moving randomly in the places that have no network infrastructure. While the nodes communicate with each other, they assist...
An analysis of LEACH Protocol in Wireless Sensor Network: A Survey
Wireless Sensor Network is composed of numbers of tiny sensors (nodes) which have the capability of gathering the data about environmental activities and making certain computations on them so that they can be communicat...
INTERIOR DECORATION USING AUGMENTED REALITY WITH COLOR PERCEPTION
The hands of Augmented Reality has been widened in all the fields by using it we can able to merge the virtual world objects with the real world environment in the android platform. By using this application we can able...