Efficient Techniques for Unauthorized Attacks with Time-Stamp

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 6

Abstract

 Abstract: In many applications it is very useful to identify the unexpected activities on data with respect totime. Cyber security is one of the application area in which we are using intrusion detection system to monitorthe network traffic for unauthorized activities and it generates alerts for different types of attacks. For this wepropose Efficient algorithm named as Top-k PUS which identifies unexplained sequences and for alertsgeneration we are using GM Approach which consists of probabilistic methods. Finally experimental resultsShow that those are efficient with detection accuracy and time

Authors and Affiliations

R. Swathi

Keywords

Related Articles

 Intrusion Detection Systems By Anamoly-Based Using Neural  Network

 To improve network security different steps has been taken as size and importance of the network has  increases day by day. Then chances of a network attacks increases Network is mainly attacked by some &nbsp...

An Enhanced Round Robin CPU Scheduling Algorithm

Abstract: CPU scheduling is a process which allows one process to use the CPU while the another process is in waiting state due to unavailability of any resource like I/O etc, thereby making full use of CPU. The aim of C...

 Government Policies Search Using Marathi Speech RecognitionSystem– Based On Robust Feature Extraction Method

Abstract:Country like India, where 70% of the population lives in village and rural parts of the country, itbecomes more necessary to utilize such tools for their social, economic, administrative and governanceregenerati...

 Implementation of Tree Based Itinerary Design (TBID) Algorithm Over Wireless Sensor networks by Using Mobile Agent

 In many sensor network applications viz., environmental monitoring, spatial exploration and battlefield surveillance, sensed data is aggregated and transmitted to the sinks for analysis. Thus, in- network data ag...

Fuzzy Logic Expert System for the Diagnosis of Chili Diseases

Chilli plant is one of the major cash crop in the world, many economy depends on its production. Chilli farmer has lost a lot of their crop due to diseases which in return causes farmers to loss lot of money and time suc...

Download PDF file
  • EP ID EP121755
  • DOI -
  • Views 101
  • Downloads 0

How To Cite

R. Swathi (2014).  Efficient Techniques for Unauthorized Attacks with Time-Stamp. IOSR Journals (IOSR Journal of Computer Engineering), 16(6), 14-15. https://europub.co.uk/articles/-A-121755