Layering Based Network Intrusion Detection System to Enhance Network Attacks Detection
Journal Title: UNKNOWN - Year 2013, Vol 2, Issue 9
Abstract
Due to continuous growth of the Internet technology, it needs to establish security mechanism. Intrusion Detection System (IDS) is increasingly becoming a crucial component for computer and network security systems. Most of the existing intrusion detection techniques emphasize on building intrusion detection model based on all features provided. Some of these features are irrelevant or redundant. This paper is proposed to identify important input features in building IDS that is computationally efficient and effective. In this paper, we identify important attributes for each attack type by analyzing the detection rate. We input the specific attributes for each attack types to classify using Na
Malicious User Detection in Cooperative Environment in Cognitive Radio Networks
Malicious User Detection in Cooperative Environment in Cognitive Radio Networks
Comparative Study of PCA and LDA
Face recognition gains a lot of courtesy in recent years due to its various applications in our societies. In the appearance-based face recognition classical principal component analysis (PCA) and linear component analys...
Performance Evaluation of Star Topology in Fiber Optic Communication
Topology refers to the layout of connected devices in a network. It describes the way in which the elements of the network are mapped. Optical network topologies such as bus, star and tree reduce complexity by using mini...
Correlation between Anthropometric Variable and Goal Shooting of Korfball Player
Background: To correlate selected kin anthropometric variables with the Korfball shooting ability. Methods: A samples of 20 national and international players were selected from the teams participated in Senior National...
An Efficient Failover Enabling Mechanism in OpenStack
This Paper actually focuses on an efficient approach to enable failover in OpenStack an Open Source Cloud operating system that plays an important role in business continuity and Disaster Recovery. We have setup a simula...