A Hierarchical Intrusion Detection System for Clouds: Design and Evaluation
نویسندگان
چکیده
منابع مشابه
Entropy Based Fuzzy Rule Weighting for Hierarchical Intrusion Detection
Predicting different behaviors in computer networks is the subject of many data mining researches. Providing a balanced Intrusion Detection System (IDS) that directly addresses the trade-off between the ability to detect new attack types and providing low false detection rate is a fundamental challenge. Many of the proposed methods perform well in one of the two aspects, and concentrate on a su...
متن کاملA hierarchical SOM-based intrusion detection system
An approach to network intrusion detection is investigated, based purely on a hierarchy of SelfOrganizing Feature Maps. Our principle interest is to establish just how far such an approach can be taken in practice. To do so, the KDD benchmark dataset from the International Knowledge Discovery and Data Mining Tools Competition is employed. Extensive analysis is conducted in order to address the ...
متن کاملModel - Based Intrusion Detection System Design and Evaluation
Eighteen years after the original Internet worm of 1988, software still suffers from vulnerabilities that allow attackers to gain illicit access to computer systems. Attackers exploit vulnerabilities to hijack control of a process’ execution as a means to access or alter a system as they desire. In this dissertation, we argue that model-based anomaly detectors can retrofit efficient attack dete...
متن کاملModel-based Intrusion Detection System Design And Evaluation
The proposed model has an anomaly based IDS with an adaptive learning the KDD DAPRA dataset which was designed for network IDS evaluation. The following network design diagram is for detecting distributed denial service attacks. An Intrusion Detection System (IDS) is a software application or device that monitors the Here, trained model consists of big datasets with distributed storage Performa...
متن کاملentropy based fuzzy rule weighting for hierarchical intrusion detection
predicting different behaviors in computer networks is the subject of many data mining researches. providing a balanced intrusion detection system (ids) that directly addresses the trade-off between the ability to detect new attack types and providing low false detection rate is a fundamental challenge. many of the proposed methods perform well in one of the two aspects, and concentrate on a su...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal on Cloud Computing: Services and Architecture
سال: 2012
ISSN: 2231-6663
DOI: 10.5121/ijccsa.2012.2601