Efficient Techniques for Unauthorized Attacks with Time-Stamp

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 6

Abstract

 Abstract: In many applications it is very useful to identify the unexpected activities on data with respect totime. Cyber security is one of the application area in which we are using intrusion detection system to monitorthe network traffic for unauthorized activities and it generates alerts for different types of attacks. For this wepropose Efficient algorithm named as Top-k PUS which identifies unexplained sequences and for alertsgeneration we are using GM Approach which consists of probabilistic methods. Finally experimental resultsShow that those are efficient with detection accuracy and time

Authors and Affiliations

R. Swathi

Keywords

Related Articles

 Back-Propagation Neural Network Learning with PreservedPrivacy using Cloud Computing

 Abstract: Cloud computing facilitates the owners to share data. Multiple parties join the learning process byconducting joint Back propagation neural network algorithm on the union of their respective data sets. Du...

 Mining Of Influential Users in a Blog Network

 Abstract: Blogging sites are very popular in today’s world; users interact with each other and create socialrelationships between them. Data mining methods can be used to extract the blogging sites. Users can be ac...

Cryptographic Approach of Generic Caching strategy for Opportunistic Wireless Networks (OPPNETS)

Abstract: In Opportunistic networks, if a mobile finds that the content of its interest is available in other mobiles, it will send a message to request for the content and download it. The term subscriber denotes a node...

 Wireless Sensor Grids Energy Efficiency Enrichment UsingQuorum Techniques

 Abstract: Wireless sensor networks are mainly considered for atmosphere reconnaissance, wherein wirelesssensor nodes collaborate to get their work done. Generally, wireless sensors are battery powered; therefore, i...

 Descriptive and multivariable analysis of the water parameters quality of Sfax sewage treatment plant after rehabilitation

 This study detailed the effect of simultaneous multiple intrinsic and extrinsic factors on the characteristics of Sfax activated sludge wastewater treatment plant (WWTP), located in Southern East Tunisia. The pl...

Download PDF file
  • EP ID EP121755
  • DOI -
  • Views 77
  • Downloads 0

How To Cite

R. Swathi (2014).  Efficient Techniques for Unauthorized Attacks with Time-Stamp. IOSR Journals (IOSR Journal of Computer Engineering), 16(6), 14-15. https://europub.co.uk/articles/-A-121755