19,151 research outputs found
IDS by Using Data Mining Based on Class-Association-Rule Mining and Genetic Network Programming
Now a day’s security is considered as major topics in networks, since the network has increasing widely day by day. Therefore, intrusion detection systems have paid more awareness, as it has an ability to identify intrusion accesses effectively. All these systems can spot the attacks and behave by trigger different errors .The proposed system includes a data mining method with fuzzy logic and class-association rule mining method which is based on genetic algorithm [1]. As the use of fuzzy logic, the recommend system can able to show the different type of features and also able to keep away from the different problems that are arising in to the suggested system approach. By using Genetic algorithm it is possible to find many rules and regulations and that are use to anomaly detection systems an association-rule-mining is very important technique that is used to find valuable rules and these rules are used by different users, instead of to find all the rules meeting the criteria that are useful for detection. Different results that are experimented with KDD99 [9] Cup database realise that the proposed approach gives more detection rates as compared to crisp data mining.
DOI: 10.17762/ijritcc2321-8169.15063
Recommended from our members
A survey of intrusion detection techniques in Cloud
Cloud computing provides scalable, virtualized on-demand services to the end users with greater flexibility and lesser infrastructural investment. These services are provided over the Internet using known networking protocols, standards and formats under the supervision of different managements. Existing bugs and vulnerabilities in underlying technologies and legacy protocols tend to open doors for intrusion. This paper, surveys different intrusions affecting availability, confidentiality and integrity of Cloud resources and services. It examines proposals incorporating Intrusion Detection Systems (IDS) in Cloud and discusses various types and techniques of IDS and Intrusion Prevention Systems (IPS), and recommends IDS/IPS positioning in Cloud architecture to achieve desired security in the next generation networks
APHRODITE: an Anomaly-based Architecture for False Positive Reduction
We present APHRODITE, an architecture designed to reduce false positives in
network intrusion detection systems. APHRODITE works by detecting anomalies in
the output traffic, and by correlating them with the alerts raised by the NIDS
working on the input traffic. Benchmarks show a substantial reduction of false
positives and that APHRODITE is effective also after a "quick setup", i.e. in
the realistic case in which it has not been "trained" and set up optimall
CONDOR: A Hybrid IDS to Offer Improved Intrusion Detection
Intrusion Detection Systems are an accepted and very
useful option to monitor, and detect malicious activities.
However, Intrusion Detection Systems have inherent limitations which lead to false positives and false negatives; we propose that combining signature and anomaly based IDSs should be examined. This paper contrasts signature and anomaly-based IDSs, and critiques some proposals about hybrid IDSs with signature and heuristic capabilities, before considering some of their contributions in order to include them as main features of a new hybrid IDS named CONDOR (COmbined Network intrusion Detection ORientate), which is designed to offer superior pattern analysis and anomaly detection by reducing false positive rates and administrator intervention
- …