Detecting Anomaly IDS in Network using Bayesian Network

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1

Abstract

 In a hostile area of network, it is a severe challenge to protect sink, developing flexible and adaptive security oriented approaches against malicious activities. Intrusion detection is the act of detecting, monitoring  unwanted activity and traffic on a network or a device, which violates security policy. This paper begins with a  review of the most well-known anomaly based intrusion detection techniques. AIDS is a system for detecting  computer intrusions, type of misuse that falls out of normal operation by monitoring system activity and  classifying it as either normal or anomalous .It is based on Machine Learning AIDS schemes model that allows  the attacks analyzed to be categorized and find probabilistic relationships among attacks using Bayesian  network.

Authors and Affiliations

Mrs. SumathyMuruganAsst. Prof

Keywords

Related Articles

 Review paper on performance analysis of AODV, DSDV, OLSR  on the basis of packet delivery

 The field of Adhoc Network has gained an important part of the interest of researchers and become very popular in last few years. Adhoc network can operate without fixed infrastructure and can survive rapid &nbs...

 A Comparative Result Analysis of Text Based SteganographicApproaches

Abstract: Today in this digital era everything (data) can be digitized and can be transmitted over thecommunication networks. But not withstanding with this advantage it also has a downside i.e. the digitized datacan be...

 A Review on Geometrical Analysis in Character Recognition

 Abstract: Character Recognition is a prominent area in the field of image processing. Most of the basicconcepts in image processing have been introduced in connection with research carried out in characterrecogniti...

 Video Steganography Using LSB Matching Revisited Algorithm

 Abstract: Video Steganography deals with hiding secret data or information within a video. In this paper, a spatial domain technique for LSB Matching Revisited algorithm (LSBMR) has been proposed, where the secret...

Role of Operational System Design in Data Warehouse Implementation: Identifying the Operational System Design Gaps and techniques to handle them

Abstract: Data warehouse designing process takes input from operational system of the organization. Quality of data warehousing solution depends on design of operational system. Often, operational system implementations...

Download PDF file
  • EP ID EP152058
  • DOI -
  • Views 101
  • Downloads 0

How To Cite

Mrs. SumathyMuruganAsst. Prof (2014).  Detecting Anomaly IDS in Network using Bayesian Network. IOSR Journals (IOSR Journal of Computer Engineering), 16(1), 1-7. https://europub.co.uk/articles/-A-152058