Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Intruder Detection System over Abnormal Internet Sequence
Post: #1

Intruder Detection System over Abnormal Internet Sequence


This paper reports the design principles and evaluation results of a new experimental hybrid invasion detection system (HIDS). This hybrid system combines the advantages of low false-positive rate of signature-based invasion detection system (IDS) and the ability of anomaly detection system (ADS) to detect novel unknown attacks. By mining anomalous traffic sequences from Internet connections, we build an ADS that detects anomalies beyond the capabilities of signature-based SNORT or Bro systems. A weighted signature generation scheme is developed to integrate ADS with SNORT by extracting signatures from anomalies detected. HIDS extracts signatures from the output of ADS and adds them into the SNORT signature database for fast and accurate invasion detection. By testing our HIDS scheme over real-life Internet trace data mixed with 10 days of Massachusetts Institute of Technology/ Lincoln Laboratory (MIT/LL) attack data set, our experimental results show a 60 percent detection rate of the HIDS, compared with 30 percent and 22 percent in using the SNORT and Bro systems, respectively. This sharp increase in detection rate is obtained with less than 3 percent false alarms. The signatures generated by ADS upgrade the SNORT performance by 33 percent. The HIDS approach proves the vitality of detecting invasions and anomalies, simultaneously, by automated data mining and signature generation over Internet connection sequences.



Processor : Intel Pentium IV
Clock Speed : 700 MHZ
RAM : 128 MB
Monitor : 14 SVGA Digital Color Monitor
Keyboard : 107 Keys Keyboard
Floppy Drive : 1.44MB
Compact Disk Drive : 700MB
Hard Disk : 20GB
Printer : Canon BJC 2100 SP
Mouse : Logitech Mouse


Operating System : Windows 98,2000,xp
Tools : jdk1.5.0
Post: #2
to get information about the topic Intrusion detection system over abnormal internet sequence full report ppt and related topic refer the link bellow

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: pn sequence in matlab, internet over electrical wires, pdf intruder alarm with pirsensoe and 8051microcontroller, seminar topics for self resetting intruder alarm, suzuki intruder battery, fibonacci sequence verilog, ci engine ppt for abnormal combustion,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  SUSPICIOUS EMAIL DETECTION seminar class 11 6,172 21-04-2016 11:16 AM
Last Post: dhanyavp
  DATA LEAKAGE DETECTION project topics 16 11,333 31-07-2015 02:59 PM
Last Post: seminar report asees
  An Acknowledgement-Based Approach for the Detection of routing misbehavior in MANETs mechanical engineering crazy 2 2,010 26-05-2015 03:04 PM
Last Post: seminar report asees
  An Acknowledgment-Based Approach For The Detection Of Routing Misbehavior In MANETs electronics seminars 7 3,578 27-01-2015 12:09 AM
Last Post: Guest
  Credit Card Fraud Detection Using Hidden Markov Models alagaddonjuan 28 17,776 04-09-2014 11:31 PM
Last Post: Charlescic
  Digital Image Processing Techniques for the Detection and Removal of Cracks in Digiti electronics seminars 4 3,835 22-07-2013 09:37 PM
Last Post: Guest
  OBSTACLE DETECTION AND AVOIDANCE ROBOT seminar surveyer 5 6,368 24-06-2013 10:44 AM
Last Post: computer topic
  Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet electronics seminars 6 2,099 26-04-2013 01:58 PM
Last Post: Guest
  Intelligent system for Gas, Human detection and Temperature Monitor control using GSM seminar surveyer 3 2,450 17-04-2013 11:37 PM
Last Post: [email protected]
  Handling Selfishness in Replica Allocation over a Mobile Ad Hoc Network Projects9 1 824 08-01-2013 02:25 PM
Last Post: Guest