Detecting Anomaly IDS in Network using Bayesian Network
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1
Abstract
In a hostile area of network, it is a severe challenge to protect sink, developing flexible and adaptive security oriented approaches against malicious activities. Intrusion detection is the act of detecting, monitoring unwanted activity and traffic on a network or a device, which violates security policy. This paper begins with a review of the most well-known anomaly based intrusion detection techniques. AIDS is a system for detecting computer intrusions, type of misuse that falls out of normal operation by monitoring system activity and classifying it as either normal or anomalous .It is based on Machine Learning AIDS schemes model that allows the attacks analyzed to be categorized and find probabilistic relationships among attacks using Bayesian network.
Authors and Affiliations
Mrs. SumathyMuruganAsst. Prof
Automatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage
The main target of this paper is to propose an algorithm to implement data hiding in DNA sequences to increase the confidentiality and complexity by using software point of view in cloud computing environments. &...
Empirical Coding for Curvature Based Linear Representation inImage Retrieval System
Abstract : Image retrieval systems are finding their applications in all automation systems, wherein automateddecision needs to be taken based on the image contents. The prime requirement of such systems is to develop av...
Simulation of ONVIF Network Devices Using JAVA
Abstract : In today’s world, cross platform integration of application plays important role to achieve economic viability and usability of the product. This paper describes technical details of the successfully implement...
Comparative Analysis of Feature Extraction Methods for Optic Disc Detection
Abstract: Medical image analysis and processing has great significance in the field of medicine, especially in non-invasive treatment and clinical study. Normally fundus images are manually graded by specially trai...
A Novel Approach for Workload Optimization and ImprovingSecurity in Cloud Computing Environments
Abstract: This paper discusses a propose cloud infrastructure that combines On-Demand allocation ofresources with improved utilization, opportunistic provisioning of cycles from idle cloud nodes to otherprocesses.B...