intrusion detection based on data mining
#1

i need project report on intrusion detection based using data mining
Reply
#2

Where we are today in the intrusion detection?
In today's world, where almost every company depends on the Internet is to survive, it is not surprising that the role of the network intrusion detection has grown so fast. While it still may be some argument as to what is the best way to protect firms network (i.e. firewalls, patches, intrusion detection, training, etc.) it is certain that the intrusion detection system (IDS) is likely to maintain an important role in providing a secure network architecture.
That being said, what modern intrusion detection technology to provide us? For the analyst, who sits in front of the IDS, the ideal system would identify all the invasion (or attempted burglary), and take or recommend appropriate action to stop the attack.
Unfortunately, the market for IDS is still quite young and "silver bullet" solution to detect all attacks do not seem to be on the horizon, or necessarily even believable. So what is the "next step", while the "next step" for intrusion detection? a strong case can be made for the use of data mining techniques to improve the current state of intrusion detection.
What is data mining?
By RL Grossman in the "data mining: challenges and opportunities for data mining within the next decade," he defines data mining as it relates to the open models, associations, changes, anomalies, and statistically significant structures and developments in data. "simply put, the ability to accept data and pull out of the samples or abnormalities that may not be easily seen with the naked eye. Another term sometimes used to identify knowledge.
Although they will not be discussed in detail in this report, there are many different types of data mining algorithms to enable page link analysis, clustering, association rules, kidnapping, variance analysis and sequence analysis.
Currently IDS Intrusion detection?
In order for us to determine how data mining can help advance intrusion detection, it is important to understand how the current IDS Intrusion detection work. There are two different approaches to intrusion detection: incorrect identification and detection of anomalies. Detection of abuse is the ability to detect the invasion on the basis of the famous model for malicious activity. These famous structures are called signatures. the second approach, detecting anomalies, is to attempt to identify malicious traffic based on deviations from the normal patterns of network traffic. Most, if not all, of the IDS that can be purchased today are based on the detection of child abuse. Current IDS products are supplied with a large set of signatures, that have been identified as unique to the particular vulnerabilities or exploitation. Most manufacturers also provide regular IDS signature updates in an attempt to keep pace with the rapid emergence of new vulnerabilities and exploits.
Shortcomings with current IDS.
While the ability to develop and use a signature for attack detection is a useful and effective approach has drawbacks with this approach, you should pay attention to.
Options. As previously mentioned signatures, developed in response to new vulnerabilities or exploits that were placed or released. An integral part of the success of the label, it must be sufficiently unique to just warn about malicious traffic and rarely on reliable network traffic. the difficulty here is that malicious code can often be easily changed. It is not uncommon for a tool that will be released and then its default changed soon after the hacking community.
The overall false positive complaint number of false positives generated IDS. Development of unique signatures, is a difficult task and often sellers will err on the side of warnings too often, rather than not enough. This is similar to the story of the boy who cried wolf. It's much harder to select the right to the invasion if the signature is also regularly warns of the real network activity. the complexity of the problem that arises from this, it can be filtered without using potentially there is no attack.
False Negative. ... Detection of attacks, for which no known signatures. This leads to another concept of false negatives, where IDS do not generate a notification when an invasion is going on. Simply put, if the signature was not written for each vulnerability, there is a very good chance that the IDS does not detect it.
Data overload. Another aspect that is specific to that discovery abuse, but it is essential that as much data can effectively analyze analyst.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: a new data mining based network intrusion detection model, real time data mining based intrusion detection full report, data mining types intrusion detection system, intrusion detection system based on data mining, intrusion detection in data mining ppt ppt, intrusion detection data mining, ppt on data mining based network intrusion detection,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  anomaly detection code in matlab 3 2,094 23-04-2018, 12:04 AM
Last Post: Guest
  matlab code shadow detection and removal in colour images using matlab 2 2,262 12-01-2018, 01:24 PM
Last Post: dhanabhagya
  ppt for bomb detection using robot 3 2,651 02-01-2018, 03:40 PM
Last Post: dhanabhagya
  cloud data protection for the masses documentation 7 4,113 04-12-2017, 03:23 PM
Last Post: jaseela123d
  matlab code for speed breaker detection 1 1,297 27-10-2017, 10:22 AM
Last Post: Guest
  skin cancer detection using neural networks matlab code 13 3,895 23-10-2017, 02:52 PM
Last Post: Guest
  optic disc detection and segmentation ppt 3 1,943 13-09-2017, 11:41 AM
Last Post: jaseela123d
  matlab code for blood cancer detection 2 1,346 15-07-2017, 03:00 PM
Last Post: jaseela123d
  eaack a secure intrusion detection system for manets ppt 2 1,239 08-06-2017, 10:26 AM
Last Post: jaseela123d
  pcb defect detection matlab code pdf 4 1,398 06-05-2017, 09:31 AM
Last Post: jaseela123d

Forum Jump: