Improving Accuracy in Decision Making for Detecting Intruders
Journal Title: International Journal of P2P Network Trends and Technology(IJPTT) - Year 2013, Vol 3, Issue 1
Abstract
Normal host based Intrusion detection system provides us some alerts of data integrity breach on the basis of policy violation and unauthorized access. There are some factors responsible if any employee of the enterprise access some files on which basis policy and permissions are applied. If these are incorrectly applied then false positive rate of intrusion detection increases. To minimize this rate and to better understand about the user who access unauthorized file, a framework is proposed which assemble data and information from diverse devices, and a special active record will be created, which will help the administrator to take better decision which will improve accuracy in decision making and more supportive policies and permissions can be implemented on intrusion detection system. This will also improve the storage system’s performance by less recovery operations.
Authors and Affiliations
Monika Sehgal#1, Nitin Umesh
RIP (Resin Impregnated Paper) Bushing for EHV Class Power Transformer
The overall reliability of a power transformer depends to a great extent on the sound operation of bushing. The OIP (Oil Impregnated Paper) Bushing is conventionally used in power transformer. Now a days a new technology...
A Study of Asynchronous Routing Protocols in Peer to Peer Networks
Mobile Ad Hoc Network (MANET) is a self organized and self configurable network where the mobile nodes move arbitrarily. It is a collection of multi-hop wireless mobile nodes that communicate with each other without cent...
Extracting Multiwords From Large Document Collection Based N-Gram
Multiword terms (MWTs) are relevant strings of words in text collections. Once they are automatically extracted, they may be used by an Information Retrieval system, suggesting its users possible conceptual interes...
Cloud Computing: A Responsibility data sharing in the cloud computing
Cloud computing provides highly efficient services to be easily accessed or used over the Internet on as needed basis. An important feature of the cloud services is that users’ data are usually processed remotely i...
Communication and Implementation of Plug and Play Enabled Devices in Sensor Network
Most of sensor networks are static in nature and do not provide standardized and systematic network management capabilities. Intelligence is not associated with the sensors. In order to make a sensor network more...