Detecting Anomaly IDS in Network using Bayesian Network
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1
Abstract
In a hostile area of network, it is a severe challenge to protect sink, developing flexible and adaptive security oriented approaches against malicious activities. Intrusion detection is the act of detecting, monitoring unwanted activity and traffic on a network or a device, which violates security policy. This paper begins with a review of the most well-known anomaly based intrusion detection techniques. AIDS is a system for detecting computer intrusions, type of misuse that falls out of normal operation by monitoring system activity and classifying it as either normal or anomalous .It is based on Machine Learning AIDS schemes model that allows the attacks analyzed to be categorized and find probabilistic relationships among attacks using Bayesian network.
Authors and Affiliations
Mrs. SumathyMuruganAsst. Prof
Analysis on Data Integrity in Cloud Environment
Abstract: Cloud Computing privileges convenient, easy on-demand access to a collection of configurable resources and services. The services and resources on the cloud can be robustly deployed with low maintenance cost, e...
An Optimized and Secured Ranking Approach for Retrieving Cloud Data Using Keyword Search
Abstract: Cloud computing is a versatile technology that emerged as a solution to reduce costs in organizations by providing on-demand high quality applications and services from a centralized pool of configurable comput...
Enhancing Security and Fine-Grained Access Control for Personal Health Record in Cloud Computing
Now a days , personal health record become patient-centric model in which PHR service allows a patient to manage and control personal health data in one place through the web, which has made the storage, retrieval and sh...
Risk Management in Agile Model
Abstract: In traditional waterfall-model risks were usually managed by using project risk management frameworks. Nowadays agile methods have started replacing the traditional models. Agile development is based on s...
Distributed Computing Challenges
Abstract: In recent years, distributed computing systems has been widely explored in order to improve system performance in terms of scalability and reliability.A distributed computing system allows the user to sha...