A DATA MINING ANALYSIS & APPROACH WITH INTRUSIONDETECTION / PREVENTION FROM REAL

Journal Title: International Journal of Modern Engineering Research (IJMER) - Year 2013, Vol 3, Issue 1

Abstract

 Abstract: We propose a mechanism for false positive/negative assessment with multiple IDSs/IPSs to collect FP and FN cases from real-world traffic and statistically analyze these cases. False positives and false negatives happen to every intrusion detection and intrusion prevention system. IDSs/IPSs can identify a normal activity as malicious one, causing a false positive (FP) or malicious traffic as normal, causing a false negative (FN) .To create a pool of traffic traces causing possible FPs and FNs to IDSs using Attack Session Extraction (ASE).Statistically analyze the packet by preprocessing based on protocol for each layer .Based on thatBinary classifiers are generated for each class of event using relevant features for the class using classification algorithm .Binary classifiers are derived from the training sample by considering all classes other than the current class .Analyzing the KDD data set for pattern matching and the effect of combining different classifiers can be explained with the theory of bias-variance decomposition using multi boosting.

Authors and Affiliations

Meenakshi. RM

Keywords

Related Articles

High Performance MAC Unit for FFT Implementation

In this paper we have proposed an efficient way of implementing a Fast Fourier Transform (FFT) processor using high performance pipelined Multiply and Accumulate (MAC) unit. The multiplication unit is implemented us...

 Greedy – based Heuristic for OSC problems in Wireless Sensor Networks

 This paper contains optimize set coverage problem in wireless sensor networks with adaptable sensing range. Communication and sensing consume energy, so efficient power management can extended the network lifet...

 RANKING CONCEPT-BASED USER PROFILE FROM SEARCH ENGINE LOGS

 Commercial search engines return roughly the same results for the same query, regardless of the user’s real interest. Since queries submitted to search engines tend to be short and ambiguous, they are not likely to...

Assessing Water Demand And Supply For Srinagar City (J&K) India, Under Changing Climatic Scenarios Using Water Evaluation And Planning Model (WEAP)

The study holds significance keeping in view the global climatic concerns, which began to cast their shadows on the climate of Jammu and Kashmir as well. In order to accomplish the present study, WEAP (water evaluati...

Effect of Preform Geometry on the Material Behaviour and the Densification Mechanism during Hot Upset Forging of Sintered AISI 9840 P/M Steel Produced Using Elemental Powders

The present investigation pertains to generate experimental data in order to establish the influence of initial preform geometries on the material behaviour and the operative densification mechanism/s during ho...

Download PDF file
  • EP ID EP120190
  • DOI -
  • Views 96
  • Downloads 0

How To Cite

Meenakshi. RM (2013).  A DATA MINING ANALYSIS & APPROACH WITH INTRUSIONDETECTION / PREVENTION FROM REAL. International Journal of Modern Engineering Research (IJMER), 3(1), 547-550. https://europub.co.uk/articles/-A-120190