Anomaly Detection
#2
Anomaly Detection


.ppt   Anomaly Detection.ppt (Size: 341 KB / Downloads: 1)

What is Anomaly Detection

Detection of deviation from what is consider ( or from its normal behavior)
Capable of detecting Novel attacks or new attacks
Identify a activity that are different from users or a system normal behavior
To detect unauthorized attempts to access the system

Sources of Network Data

Network probes
Packet filtering
Gathering information from router
Monitoring activity of specific user
monitoring memory and N/W usage
etc….

Packet Header Anomaly Detection

Trained on attack free traffic
Checking anomaly field of packet header.
Link Layer
Network Layer
Transport Layer
The model detect novel attacks.
Split large field
Merge small field
During training record each value of fields

ADWICE

This technique deal with massive data
Efficient data structure.
New search Index.
Dynamic nature of normal request and services.
Use clustering for training data.
Where similar data point group together into cluster. Cluster using a distance function for identify closest cluster.
ADWICE store cluster feature in main memory instead of all training data points.



Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: anomaly detection matlab coded, source code for anomaly detection system on matlab, spatio temporal network anomaly detection, misuse and anomaly, anomaly detection type pdf, anomaly detection for discrete sequences a survey project, anomaly detection applications,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
Anomaly Detection - by seminar projects crazy - 13-06-2009, 04:19 PM
RE: Anomaly Detection - by computer girl - 05-06-2012, 01:36 PM

Possibly Related Threads...
Thread Author Replies Views Last Post
  OBJECT TRACKING AND DETECTION full report project topics 9 31,421 06-10-2018, 12:20 PM
Last Post: jntuworldforum
  Host-Based Intrusion Detection Using user signatures nit_cal 2 2,414 06-10-2016, 10:27 AM
Last Post: ijasti
  DETECTION OF THE MALARIAL PARASITE INFECTED BLOOD IMAGES BY 3D-ANALYSIS project report tiger 2 2,387 26-09-2016, 10:55 AM
Last Post: ijasti
  ULTRA SONIC TECHNIQUES FOR THE DETECTION OF HIDDEN CORROSION IN AIR CRAFT WING SKIN seminar projects crazy 5 6,130 15-04-2016, 08:04 PM
Last Post: knagpur
  ARTIFICIAL INTELLIGENCE IN VIRUS DETECTION AND RECOGNITION seminar project explorer 2 3,372 22-07-2013, 11:44 AM
Last Post: computer topic
  Layered Approach Using Conditional Random Fields for Intrusion Detection project report helper 11 7,776 01-03-2013, 11:58 AM
Last Post: [email protected]
  A Seminar Report On INTRUSION DETECTION SYSTEM Computer Science Clay 1 5,768 23-11-2012, 01:13 PM
Last Post: seminar details
  Image Edge Detection based on FPGA seminar class 1 3,979 18-10-2012, 11:43 AM
Last Post: seminar details
  A NOVEL REPLICA DETECTION SYSTEM USING BINARY CLASSIFIERS, R-TREES, AND PCA computer girl 0 1,054 07-06-2012, 05:16 PM
Last Post: computer girl
  Intrusion Detection in Mobile Ad-Hoc Networks nit_cal 1 1,543 14-03-2012, 01:06 PM
Last Post: seminar paper

Forum Jump: