Robust Data Clustering Algorithms for Network Intrusion Detection
Journal Title: International Journal of Computer & organization Trends(IJCOT) - Year 2012, Vol 2, Issue 5
Abstract
IDS (Intrusion Detection system) is an active and driving defense technology. Intrusion detection is to detect attacks against a computer system. This project mainly focuses on intrusion detection based on data mining. Data mining is to identify valid, novel, potentially useful, and ultimately understandable patterns in massive data. One of the primary challenges to intrusion detection are the problem of misjudgment, misdetection and lack of real time response to the attack. In the recent years, as the second line of defense after firewall This project presents an approach to detect intrusion based on data mining frame work. In this framework, intrusion detection is achieved using clustering techniques. Firstly, a method to reduce the noise in the data set using improved kmeans. This system use K-means,FCM and Improved K-means data mining algorithms are used to improves the performance of intrusion detection since the traffic is large and the types of attack are various. By the more accurate method of finding k clustering center, an anomaly detection model was presented to get better detection effect. This project used KDD CUP 1999 data set to test the performance of the model. The results show thesystem has a higher detection rate and a lower false alarm rate, it achieves expectant aim.
Authors and Affiliations
Gunja Ambica #1 , Mrs. N. Rajeswari#2
Fractal Image Compression Techniques
Image compression is an essential technology in multimedia and digital communication fields. Fractal image compression is a potential image compression scheme due to its potential high compression ratio, fast decompressi...
A Simulation And Analysis Of Secured S-DSR Protocol In Mobile Ad Hoc Networks
AMANET is as pecial kind of wireless network, which can be treated as a collection of mobile nodes co-existing with each other without the need of any fixed infrastructure. Because of the limited physical security,...
Secure Keyword Based Search in Cloud Computing: A Review
An effective search that give the better suggestion to the user so that the user can get better choices for the services is also a challenge for cloud computing. Several methods have been given to solve the problem of ef...
Denoising of a Color image using fuzzy Filtering Techniques
In this paper, different types of filtering techniques are used for the removal of noise in an image. The results are obtained by three steps in the filtering process. Step by step the noise is removed in a considerable...
LFSR Based Watermark and Address Generator for Digital Image Watermarking SRAM
In digital image watermarking authentication methods and techniques, the original image will be watermarked with a text, image, audio or any signature. To overcome the uneven and enormous distribution of multi...