source code for intrusion detection system in ns2
#1
Wink 

Are you looking for source code for intrusion detection system in ns2 ?
Reply
#2
source code for intrusion detection system in ns2

Abstract

Due to increasing number of network attacks, it is highly crucial to equip networks with an intrusion detection system (IDS). These systems must be able to deal with today's high speed and large scale networks. In this paper we propose a distributed IDS that performs both data capturing and data analyzing in a distributed fashion. This distributed mechanism enables our system to effectively operate within large scale and high traffic rate networks. We developed a grouping mechanism which divides computers in the network into subsets of computers with a leader and a few members. Subsequently, using a data sharing mechanism we were able to detect distributed attacks. Our data sharing mechanism added an overhead on the network traffic which is negligible compared to the overall network traffic. We simulated our method in NS2 simulation environment. Then we compared our proposed system with a centralized IDS in terms of detection rate, memory usage and packet loss rate. Results showed that our system's performance was better despite of some extra load imposed by distribution of data processing.This paper introduces the network intrusion detection system (NIDS), which uses a suite of data mining techniques to automatically detect attacks against computer networks and systems. This paper focuses on two specific contributions: (i) an unsupervised anomaly detection technique that assigns a score to each network connection that reflects how anomalous the connection is, and (ii) an association pattern analysis based module that summarizes those network connections that are ranked highly anomalous by the anomaly detection module. Experimental results show that our anomaly detection techniques are successful in automatically detecting several intrusions that could not be identified using popular signature-based tools .Furthermore, given the very high volume of connections observed per unit time, association pattern based summarization of novel attacks is quite useful in enabling a security analyst to understand and characterize emerging threats.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: intrusion detection system ns2 source code, ns2 code for intrusion detection ad hoc network, intrusion detection code for manets using ns2, double guard intrusion detection system with java ns2 source code implementation, ns2 code for intrusion detectionport pdf, intrusion detection application using ns2, source code for intrusion detection system in ns2,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  simple java rmi chat application source code 2 19,264 20-07-2018, 12:08 PM
Last Post: Guest
  A New Data Mining Based Network Intrusion Detection Model prem0597 2 4,234 04-05-2018, 09:42 PM
Last Post: Guest
  authentication schemes for session passwords using color and images project source code 2 2,239 03-02-2018, 09:35 AM
Last Post: Nischithnash
  free download source code for online movie ticket booking in java 2 18,773 15-08-2017, 03:21 PM
Last Post: Morshed
  source code for rsa encryption and decryption in java 2 8,038 29-05-2017, 04:21 PM
Last Post: Meghna Jadhav
  download liver tumor ct scan image in matlab with source code 4 8,086 21-05-2017, 09:54 PM
Last Post: abdulrahmanmashaal
  online cab booking source code in asp net 3 7,962 11-05-2017, 10:39 AM
Last Post: jaseela123d
Thumbs Up online catering management system on php with report and source code and ppt 4 8,823 29-04-2017, 10:59 AM
Last Post: jaseela123d
  mini ir radar for unauthorized object detection 3 1,142 15-04-2017, 03:11 PM
Last Post: jaseela123d
  source code for task scheduling using genetic algorithm using java 2 8,549 11-04-2017, 08:31 PM
Last Post: Guest

Forum Jump: