Suche senden
Hochladen
145 148
âą
0 gefÀllt mir
âą
371 views
E
Editor IJARCET
Folgen
Technologie
Melden
Teilen
Melden
Teilen
1 von 4
Jetzt herunterladen
Downloaden Sie, um offline zu lesen
Empfohlen
Weapon detection using artificial intelligence and deep learning for security...
Weapon detection using artificial intelligence and deep learning for security...
Venkat Projects
Â
A review of machine learning based anomaly detection
A review of machine learning based anomaly detection
Mohamed Elfadly
Â
Anomaly Detection for Security
Anomaly Detection for Security
Cody Rioux
Â
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
Editor IJARCET
Â
An intrusion detection system for packet and flow based networks using deep n...
An intrusion detection system for packet and flow based networks using deep n...
IJECEIAES
Â
Poster: Monash Research Month 2009
Poster: Monash Research Month 2009
Mahfuzul Haque
Â
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
IJNSA Journal
Â
Machine learning in network security using knime analytics
Machine learning in network security using knime analytics
IJNSA Journal
Â
Empfohlen
Weapon detection using artificial intelligence and deep learning for security...
Weapon detection using artificial intelligence and deep learning for security...
Venkat Projects
Â
A review of machine learning based anomaly detection
A review of machine learning based anomaly detection
Mohamed Elfadly
Â
Anomaly Detection for Security
Anomaly Detection for Security
Cody Rioux
Â
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
Editor IJARCET
Â
An intrusion detection system for packet and flow based networks using deep n...
An intrusion detection system for packet and flow based networks using deep n...
IJECEIAES
Â
Poster: Monash Research Month 2009
Poster: Monash Research Month 2009
Mahfuzul Haque
Â
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
IJNSA Journal
Â
Machine learning in network security using knime analytics
Machine learning in network security using knime analytics
IJNSA Journal
Â
Design and Implementation of Artificial Immune System for Detecting Flooding ...
Design and Implementation of Artificial Immune System for Detecting Flooding ...
Kent State University
Â
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
IJCNCJournal
Â
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
Â
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
IJNSA Journal
Â
Msc dare journal 1
Msc dare journal 1
OluwadareOlatunji1
Â
Deep learning approach for network intrusion detection system
Deep learning approach for network intrusion detection system
Avinash Kumar
Â
Wmn06MODERNIZED INTRUSION DETECTION USING ENHANCED APRIORI ALGORITHM
Wmn06MODERNIZED INTRUSION DETECTION USING ENHANCED APRIORI ALGORITHM
ijwmn
Â
IDS - Fact, Challenges and Future
IDS - Fact, Challenges and Future
amiable_indian
Â
Artificial immune system against viral attack
Artificial immune system against viral attack
UltraUploader
Â
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
IJNSA Journal
Â
11.a genetic algorithm based elucidation for improving intrusion detection th...
11.a genetic algorithm based elucidation for improving intrusion detection th...
Alexander Decker
Â
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
Alexander Decker
Â
Kx3419591964
Kx3419591964
IJERA Editor
Â
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
IRJET Journal
Â
A45010107
A45010107
IJERA Editor
Â
Soft computing and artificial intelligence techniques for intrusion
Soft computing and artificial intelligence techniques for intrusion
Alexander Decker
Â
Inspiration to Application: A Tutorial on Artificial Immune Systems
Inspiration to Application: A Tutorial on Artificial Immune Systems
Julie Greensmith
Â
TĂ i liá»u bá» tĂși mĂŽn ÄÆ°á»ng lá»i
TĂ i liá»u bá» tĂși mĂŽn ÄÆ°á»ng lá»i
SĂčng A TĂŽ
Â
2009 New Media Outlook
2009 New Media Outlook
Charlie Ray
Â
Vietnam
Vietnam
jeffmarshall
Â
Vietnam Intro To Truman
Vietnam Intro To Truman
Nathan Tengowski
Â
433 438
433 438
Editor IJARCET
Â
Weitere Àhnliche Inhalte
Was ist angesagt?
Design and Implementation of Artificial Immune System for Detecting Flooding ...
Design and Implementation of Artificial Immune System for Detecting Flooding ...
Kent State University
Â
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
IJCNCJournal
Â
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
Â
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
IJNSA Journal
Â
Msc dare journal 1
Msc dare journal 1
OluwadareOlatunji1
Â
Deep learning approach for network intrusion detection system
Deep learning approach for network intrusion detection system
Avinash Kumar
Â
Wmn06MODERNIZED INTRUSION DETECTION USING ENHANCED APRIORI ALGORITHM
Wmn06MODERNIZED INTRUSION DETECTION USING ENHANCED APRIORI ALGORITHM
ijwmn
Â
IDS - Fact, Challenges and Future
IDS - Fact, Challenges and Future
amiable_indian
Â
Artificial immune system against viral attack
Artificial immune system against viral attack
UltraUploader
Â
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
IJNSA Journal
Â
11.a genetic algorithm based elucidation for improving intrusion detection th...
11.a genetic algorithm based elucidation for improving intrusion detection th...
Alexander Decker
Â
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
Alexander Decker
Â
Kx3419591964
Kx3419591964
IJERA Editor
Â
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
IRJET Journal
Â
A45010107
A45010107
IJERA Editor
Â
Soft computing and artificial intelligence techniques for intrusion
Soft computing and artificial intelligence techniques for intrusion
Alexander Decker
Â
Inspiration to Application: A Tutorial on Artificial Immune Systems
Inspiration to Application: A Tutorial on Artificial Immune Systems
Julie Greensmith
Â
Was ist angesagt?
(17)
Design and Implementation of Artificial Immune System for Detecting Flooding ...
Design and Implementation of Artificial Immune System for Detecting Flooding ...
Â
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
Â
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
Â
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
Â
Msc dare journal 1
Msc dare journal 1
Â
Deep learning approach for network intrusion detection system
Deep learning approach for network intrusion detection system
Â
Wmn06MODERNIZED INTRUSION DETECTION USING ENHANCED APRIORI ALGORITHM
Wmn06MODERNIZED INTRUSION DETECTION USING ENHANCED APRIORI ALGORITHM
Â
IDS - Fact, Challenges and Future
IDS - Fact, Challenges and Future
Â
Artificial immune system against viral attack
Artificial immune system against viral attack
Â
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
Â
11.a genetic algorithm based elucidation for improving intrusion detection th...
11.a genetic algorithm based elucidation for improving intrusion detection th...
Â
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
Â
Kx3419591964
Kx3419591964
Â
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
Â
A45010107
A45010107
Â
Soft computing and artificial intelligence techniques for intrusion
Soft computing and artificial intelligence techniques for intrusion
Â
Inspiration to Application: A Tutorial on Artificial Immune Systems
Inspiration to Application: A Tutorial on Artificial Immune Systems
Â
Andere mochten auch
TĂ i liá»u bá» tĂși mĂŽn ÄÆ°á»ng lá»i
TĂ i liá»u bá» tĂși mĂŽn ÄÆ°á»ng lá»i
SĂčng A TĂŽ
Â
2009 New Media Outlook
2009 New Media Outlook
Charlie Ray
Â
Vietnam
Vietnam
jeffmarshall
Â
Vietnam Intro To Truman
Vietnam Intro To Truman
Nathan Tengowski
Â
433 438
433 438
Editor IJARCET
Â
Tiá»u luáșn TÆ° tÆ°á»ng Há» ChĂł Minh
Tiá»u luáșn TÆ° tÆ°á»ng Há» ChĂł Minh
king2vein
Â
BĂ i+giáșŁng+Älcm+Äcsvn (2)
BĂ i+giáșŁng+Älcm+Äcsvn (2)
LĂȘ XuĂąn
Â
ChÆ°ÆĄng VII tÆ° tÆ°á»ng Há» ChĂ Minh vá» vÄn hĂła
ChÆ°ÆĄng VII tÆ° tÆ°á»ng Há» ChĂ Minh vá» vÄn hĂła
le hue
Â
Andere mochten auch
(8)
TĂ i liá»u bá» tĂși mĂŽn ÄÆ°á»ng lá»i
TĂ i liá»u bá» tĂși mĂŽn ÄÆ°á»ng lá»i
Â
2009 New Media Outlook
2009 New Media Outlook
Â
Vietnam
Vietnam
Â
Vietnam Intro To Truman
Vietnam Intro To Truman
Â
433 438
433 438
Â
Tiá»u luáșn TÆ° tÆ°á»ng Há» ChĂł Minh
Tiá»u luáșn TÆ° tÆ°á»ng Há» ChĂł Minh
Â
BĂ i+giáșŁng+Älcm+Äcsvn (2)
BĂ i+giáșŁng+Älcm+Äcsvn (2)
Â
ChÆ°ÆĄng VII tÆ° tÆ°á»ng Há» ChĂ Minh vá» vÄn hĂła
ChÆ°ÆĄng VII tÆ° tÆ°á»ng Há» ChĂ Minh vá» vÄn hĂła
Â
Ăhnlich wie 145 148
A45010107
A45010107
IJERA Editor
Â
A combined approach to search for evasion techniques in network intrusion det...
A combined approach to search for evasion techniques in network intrusion det...
eSAT Journals
Â
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
Editor IJARCET
Â
352 356
352 356
Editor IJARCET
Â
06558266
06558266
Vidya Sagar
Â
Classification Rule Discovery Using Ant-Miner Algorithm: An Application Of N...
Classification Rule Discovery Using Ant-Miner Algorithm: An Application Of N...
IJMER
Â
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
IJCSIS Research Publications
Â
Gp3112671275
Gp3112671275
IJERA Editor
Â
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
IJORCS
Â
1850 1854
1850 1854
Editor IJARCET
Â
1850 1854
1850 1854
Editor IJARCET
Â
Current issues - International Journal of Network Security & Its Applications...
Current issues - International Journal of Network Security & Its Applications...
IJNSA Journal
Â
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
ijcsit
Â
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
Â
An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...
Editor IJMTER
Â
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
IDES Editor
Â
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTION
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTION
IJNSA Journal
Â
ATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIER
ATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIER
CSEIJJournal
Â
Attack Detection Availing Feature Discretion using Random Forest Classifier
Attack Detection Availing Feature Discretion using Random Forest Classifier
CSEIJJournal
Â
A SURVEY ON THE USE OF DATA CLUSTERING FOR INTRUSION DETECTION SYSTEM IN CYBE...
A SURVEY ON THE USE OF DATA CLUSTERING FOR INTRUSION DETECTION SYSTEM IN CYBE...
IJNSA Journal
Â
Ăhnlich wie 145 148
(20)
A45010107
A45010107
Â
A combined approach to search for evasion techniques in network intrusion det...
A combined approach to search for evasion techniques in network intrusion det...
Â
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
Â
352 356
352 356
Â
06558266
06558266
Â
Classification Rule Discovery Using Ant-Miner Algorithm: An Application Of N...
Classification Rule Discovery Using Ant-Miner Algorithm: An Application Of N...
Â
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Â
Gp3112671275
Gp3112671275
Â
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
Â
1850 1854
1850 1854
Â
1850 1854
1850 1854
Â
Current issues - International Journal of Network Security & Its Applications...
Current issues - International Journal of Network Security & Its Applications...
Â
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
Â
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
Â
An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...
Â
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
Â
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTION
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTION
Â
ATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIER
ATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIER
Â
Attack Detection Availing Feature Discretion using Random Forest Classifier
Attack Detection Availing Feature Discretion using Random Forest Classifier
Â
A SURVEY ON THE USE OF DATA CLUSTERING FOR INTRUSION DETECTION SYSTEM IN CYBE...
A SURVEY ON THE USE OF DATA CLUSTERING FOR INTRUSION DETECTION SYSTEM IN CYBE...
Â
Mehr von Editor IJARCET
Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
Editor IJARCET
Â
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
Editor IJARCET
Â
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
Editor IJARCET
Â
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
Editor IJARCET
Â
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
Editor IJARCET
Â
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
Editor IJARCET
Â
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
Editor IJARCET
Â
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
Editor IJARCET
Â
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
Editor IJARCET
Â
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
Editor IJARCET
Â
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
Editor IJARCET
Â
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
Editor IJARCET
Â
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
Editor IJARCET
Â
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
Editor IJARCET
Â
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
Editor IJARCET
Â
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
Editor IJARCET
Â
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
Editor IJARCET
Â
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
Editor IJARCET
Â
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
Editor IJARCET
Â
Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101
Editor IJARCET
Â
Mehr von Editor IJARCET
(20)
Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
Â
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
Â
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
Â
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
Â
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
Â
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
Â
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
Â
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
Â
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
Â
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
Â
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
Â
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
Â
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
Â
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
Â
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
Â
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
Â
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
Â
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
Â
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
Â
Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101
Â
KĂŒrzlich hochgeladen
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
Â
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Results
Â
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
The Digital Insurer
Â
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Safe Software
Â
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
UK Journal
Â
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Igalia
Â
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
Â
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Drew Madelung
Â
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Gabriella Davis
Â
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
Â
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
Â
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Malak Abu Hammad
Â
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
Â
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
apidays
Â
Scaling API-first â The story of a global engineering organization
Scaling API-first â The story of a global engineering organization
Radu Cotescu
Â
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Delhi Call girls
Â
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Neo4j
Â
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
hans926745
Â
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Delhi Call girls
Â
đŹ The future of MySQL is Postgres đ
đŹ The future of MySQL is Postgres đ
RTylerCroy
Â
KĂŒrzlich hochgeladen
(20)
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
Â
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Â
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
Â
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Â
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Â
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Â
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Â
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Â
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Â
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
Â
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Â
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Â
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
Â
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Â
Scaling API-first â The story of a global engineering organization
Scaling API-first â The story of a global engineering organization
Â
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Â
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Â
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
Â
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Â
đŹ The future of MySQL is Postgres đ
đŹ The future of MySQL is Postgres đ
Â
145 148
1.
ISSN: 2278 â
1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 Model for Intrusion Detection System with Data Mining Deepak Upadhyaya Shubha Jain M.Tech. Scholar HOD, CSE Department KIT, Kanpur, UP, India KIT, Kanpur, UP, India upadhyay@mail.com shubhj@rediffmail.com since they allow network administrator to detect policy Abstractâ Today internet has become very popular medium violations. However, traditional IDS are vulnerable to to communicate between users publicly, due to this, lots of original and novel malicious attacks. Also, it is very intruder has spread across the internet that perform malicious inefficient to analyze from a large amount volume data activity and attack to destroy useful information. There are such as possibility logs. In addition, there are high false many techniques to detect cyber-attacks and malicious positives and false negatives for the common IDSs. activities in computer systems in which networks Intrusion Furthermore authors have discussed also on data mining detection systems (IDSs) is one of them. It is well-known and technique and how it is helpful in IDS. Thus, how to widely-used security tool. This paper is presenting general study of the existing techniques of intrusion detection using integrate the data mining techniques into the intrusion data mining methods. Furthermore there is proposed model of detection systems has become a hot topic recently. This IDS which is the combination of clustering and classification presented whole technique of the IDS with data mining technique to. At the time of experimental analysis we will approache in details. In [2] Intrusion Detection System compare performance of the proposed IDS with existing IDS (IDS) is the most important technique to achieve higher in terms of execution time and memory utilization. security in detecting unknownmaliciousabnormal activities for a couple of years. Anomaly detection is one of Index Termsâ Data Mining; Intrusion detection System; the techniques of intrusion detection system. Current Security; Protocol; Data Base. anomaly detection is often associated with high false alarm I. INTRODUCTION with moderate accuracy and detection rates while itâs Today every one is using computer networks to connect unable to detect all types of attacks correctly. To overcome with each other and it is known as the complexity of the this problem, they have suggested a hybrid learning network. To access information and transmit information approach. In this approach they combined two different securely is an important task in the network where we techniques one is K-Means clustering and second is NaĂŻve know that information travels publicly. One of the two Bayes classification. Here they used clustering technique of most publicized threat to security is intruder (other is virus) all data into the corresponding group before applying a generally referred to as hacker or cracker. Presented paper classifier for classification purpose. is suggesting a mechanism for detecting known or Problem Identification: In previous work it has been unknown intrusions from the received packets over the observed that [1] used an algorithm known as apriori network. After receiving the packets, information is algorithm which has produced inefficient result for large extracted and intrusions are identified through matching data set. Furthermore in [2] the k-means clustering method with the rules stating behavior of normal and abnormal is applied, it often requires several analysis before the packets to flag any packets that significantly deviate from number of clusters can be determined. The choice of initial the behaviour of these normal packets. These deviations are cluster centers may be very sensitive. As each run does not called anomaly or outlier. To improve the performance of produce same result which is also disadvantages of this the proposed IDS, the data mining concept is introduced. algorithm. Due to this reason the resulting clusters depend Organization of this paper is as follows: section I presents on the initial random assignments. Moreover it minimizes introduction of IDS, section II presents a brief survey on intra-cluster variance, but does not ensure that the result has related work on Intrusion Detection System and Problem a global minimum of variance. Another disadvantage is the Identification, section III presents a proposed work. Finally, requirement for the concept of a mean to be definable section IV presents concluding remarks and references. which the case is not always. For such datasets the other variants will be appropriate. When the clusters are of II. LITERATURE SURVEY AND PROBLEM ANALYSIS different sizes and densities, problems of Empty clusters In [1] network security through Intrusion Detection occurs. Systems (IDSs) has been discussed. IDS are the most approachable and usable technique for network attacks 145 All Rights Reserved © 2012 IJARCET
2.
ISSN: 2278 â
1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 III. PROPOSED WORK Table 2: TCP header Attribute This section is presenting simple model of proposed Intrusion Detection System Using efficient data mining approach. We have analyzed some observations in a critical manner which has leaded us to further work in this field like: research should be data mining concept oriented; data set should be high-quality training data; research should explore applications of data mining in intrusion detection system; research should deal with challenges in data mining. The proposed model will enhance efficiency of intrusion detection system. The proposed model is based on data mining concept with naĂŻve Bayes Classification for anomaly detection field of intrusion detection. Data Pre-processing: Itâs already known that lots of attacks incorporated in the dataset fall into various categories. Table 1 is presenting various categories of attacks. At the time of receiving data packet (segment) some Table 1: Types of Attack comparisons are required which are as follows: ï· RCV.NXT = NEXT is the sequence number which is expected on an incoming segments, and is the lower edge or left of the receive window ï· RCV.NXT+RCV.WND-1 = LAST is the sequence number which is expected on an incoming segment, and is the upper edge or right of the receive window ï· SEG.SEQ = FIRST is the sequence number which is occupied by the incoming segment ï· SEG.SEQ+SEG.LEN-1 = LAST is the sequence number which is occupied by the incoming segment ï· To judged through a segment to occupy valid receive sequence space portion if RCV.NXT =< SEG.SEQ < RCV.NXT+RCV.WND For the purpose of research, the TCP header format is has or been elected because proposed work is based on TCP RCV.NXT =< SEG.SEQ+SEG.LEN-1 < packets; the scope of data is limited to tcp/ip packets. RCV.NXT+RCV.WND Table 2 is presenting TCP header format. Through these comparisons it can be said that which packet should be received and which not. Table 3 is representing four cases for the acceptability of an incoming packet. 146 All Rights Reserved © 2012 IJARCET
3.
ISSN: 2278 â
1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 Table 3: Acceptability of incoming packet Evaluation Measurement: For our experiment, I will use different file size ranges from 2 K to 50 K record data sets. Several performance metrics will include: ï· Packet Performance ï· Execution time ï· CPU Utilization time ï· Memory Utilization Packet Performance: Packet performance is considered Execution Time: - The execution time is considered the time that an algorithm takes to produce results. Execution time is used to calculate the throughput of an algorithm. It indicates the speed of algorithm. Memory Utilization: - The memory deals with the amount of memory space it takes for the whole process of Intrusion Note that when the receive window is zero no packet Detection System. (segment) should be acceptable except ACK segments. For CPU Utilization: - The CPU Utilization is the time that a a TCP it is possible to manage a zero receive window CPU is committed only to the particular process of during transmitting data and receiving ACKs. However, calculations. It reflects the load of the CPU. The more CPU even when the receive window is zero, a TCP must process time is used in the execution process, the higher is the load the RST (rejected) and URG (urgent) fields of all incoming of the CPU. segments. Table 4: Behavior of Packet Proposed System Framework: Here proposed model of IDS will extract attribute (defined in table 2) from the Actual Predicted Predicted Attack captured packets and will apply data preprocessing to Normal prepare training data set. There are several data extraction Normal TN(True FP (False tools available in Public Domain. Once the data will load Negative) Positive) into the training data set, it will be prepared for use by the Intrusions FN (False TP (True Positive) Data Mining approach. (attacks) Negative) Reasons for Supremacy over other algorithms:- ï· Proposed Model will be better than existing to find normal packet performance. ï· Proposed Model will be faster than existing in terms of execution time. ï· Proposed Model will be smaller than existing and easy to understand and implement. ï· It will do not contain complex structure, control flow will be well defined and looping structure will be minimized. Due to the above facts it will take very less time for execution. Figure 1: Proposed Model for IDS 147 All Rights Reserved © 2012 IJARCET
4.
ISSN: 2278 â
1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 IV. CONCLUSION The proposed mechanism will be compared and evaluated using benchmark dataset. The fundamental result will be the separation of packets between the potential attacks and the normal packets during a preliminary stage into different clusters. Itâs already known that the clusters are further classifying into more specific categories, for example Probe, R2L, U2R, DoS and Normal. Proposed mechanism will achieve very low false alarm rate while keeping the accuracy and the detection rate on average higher percentage. The proposed mechanism will be capable to classify all data correctly. In the future, we will implement the proposed mechanism for Intrusion Detection System which will be better in detecting attacks. REFERENCES [1] Wang Pu and Wang Jun-qing âIntrusion Detection System with the Data Mining Technologiesâ IEEE 2011 [2] Z. Muda, W. Yassin, M.N. Sulaiman and N.I. Udzir âIntrusion Detection based on K-Means Clustering and NaĂŻve Bayes Classificationâ 7th IEEE International Conference on IT in Asia (CITA) 2011 [3] Skorupka, C., J. Tivel, L. Talbot, D. Debarr, W. Hill, E. Bloedorn, and A. Christiansen 2001. âSurf the Flood: Reducing High-Volume Intrusion Detection Data by Automated Record Aggregation,â Proceedings of the SANS 2001 Technical Conference, Baltimore, MD [4]http://www.webopedia.com/TERM/I/intrusion_ detection_system.html [5] LI Min âApplication of Data Mining Techniques in Intrusion Detectionâ 2005 [6] KDD. (1999). Available at http://kdd.ics.uci.edu/databases/ - kddcup99/kddcup99.html 148 All Rights Reserved © 2012 IJARCET
Jetzt herunterladen