New Learning Network Traffic Model for Misuse and Anomaly Detection

Harshad D. Markad

Abstract


Now a days System security is becoming essential part of organizations. The Intrusion Detection frameworks (IDS) are getting to be irreplaceable for successful assurance against assaults that are continually changing in size and intricacy. With information honesty, privacy and accessibility, they must be solid, simple to oversee and with low upkeep cost. Different adjustments are being connected to IDS consistently to recognize new assaults and handle them. This paper proposes a model based on combination of Genetic Algorithm, Fuzzy Algorithm and principal component analysis for network traffic anomaly detection. As most IDS try to perform their task in real time but their performance hinders as they undergo different level of analysis or their reactions to limit the damages of some intrusions by terminating the network connections, a real time is not always achieved. In this research, we are going to implement intrusion detection system (IDS) using anomaly intrusion detection method for misuse and anomaly detection.

Full Text:

PDF

References


Nguyen Ha Duong, Hoang Dang Hai, A Model for Network Traffic

Anomaly Detection -ICACT Transactions on Advanced Communications

Technology (TACT) IEEE - Vol. 4, Issue 4, July 2015.

Salem Benferhat, Abdelhamid Boudjelida and Karim Tabia, Revising the

outputs of a decision tree with expert knowledge: Application to intrusion

detection and alert correlation, 2012 IEEE 24th International Conference

on Tools with Artificial Intelligence.

Mr. V. K. Pachghare, Parag Kulkarni, Pattern Based Network Security

using Decision Trees and Support Vector Machine, IEEE International

Conference on Tools with Artificial Intelligence.

Salem Benferhat, Karim Tabia, On the combination of naive Bayes and

decision trees for intrusion detection,Proceedings of the 2005 International

Conference on Computational Intelligence for Modelling, Control

and Automation, and International Conference on Intelligent Agents, Web

Technologies and Internet Commerce (CIMCAIAWTIC’05).

Jinhua Huang and Jiqing Liu, Intrusion Detection System Based on

Improved BP Neural Network and Decision Tree, 2012 IEEE fifth International

Conference on Advanced Computational Intelligence(ICACI)

October 18-20, 2012 Nanjing, Jiangsu, China.

Manish Kumar, Dr. M. Hanumanthappa, Dr. T. V. Suresh Kumar , Intrusion

Detection System Using Decision Tree Algorithm, 2012 IEEE International

Conference on Advanced Computational Intelligence(ICACI).

Mrutyunjaya Panda, Manas Ranjan Patra, A Comparative study of Data

mining algorithms for network Intrusion Detection, 2008 IEEE first

International Conference on Advanced Computational Intelligence.


Refbacks

  • There are currently no refbacks.


 

Copyright © IJETT, International Journal on Emerging Trends in Technology