Detecting Anomaly IDS in Network using Bayesian Network
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1
Abstract
In a hostile area of network, it is a severe challenge to protect sink, developing flexible and adaptive security oriented approaches against malicious activities. Intrusion detection is the act of detecting, monitoring unwanted activity and traffic on a network or a device, which violates security policy. This paper begins with a review of the most well-known anomaly based intrusion detection techniques. AIDS is a system for detecting computer intrusions, type of misuse that falls out of normal operation by monitoring system activity and classifying it as either normal or anomalous .It is based on Machine Learning AIDS schemes model that allows the attacks analyzed to be categorized and find probabilistic relationships among attacks using Bayesian network.
Authors and Affiliations
Mrs. SumathyMuruganAsst. Prof
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of packet delivery
The field of Adhoc Network has gained an important part of the interest of researchers and become very popular in last few years. Adhoc network can operate without fixed infrastructure and can survive rapid &nbs...
A Comparative Result Analysis of Text Based SteganographicApproaches
Abstract: Today in this digital era everything (data) can be digitized and can be transmitted over thecommunication networks. But not withstanding with this advantage it also has a downside i.e. the digitized datacan be...
A Review on Geometrical Analysis in Character Recognition
Abstract: Character Recognition is a prominent area in the field of image processing. Most of the basicconcepts in image processing have been introduced in connection with research carried out in characterrecogniti...
Video Steganography Using LSB Matching Revisited Algorithm
Abstract: Video Steganography deals with hiding secret data or information within a video. In this paper, a spatial domain technique for LSB Matching Revisited algorithm (LSBMR) has been proposed, where the secret...
Role of Operational System Design in Data Warehouse Implementation: Identifying the Operational System Design Gaps and techniques to handle them
Abstract: Data warehouse designing process takes input from operational system of the organization. Quality of data warehousing solution depends on design of operational system. Often, operational system implementations...