PRACTICAL NETWORK ANOMALY DETECTION USING DATA MINING TECHNIQUES
نویسندگان
چکیده
منابع مشابه
Survey on Anomaly Detection using Data Mining Techniques
In the present world huge amounts of data are stored and transferred from one location to another. The data when transferred or stored is primed exposed to attack. Although various techniques or applications are available to protect data, loopholes exist. Thus to analyze data and to determine various kind of attack data mining techniques have emerged to make it less vulnerable. Anomaly detectio...
متن کاملAnomaly Detection from Log Files Using Data Mining Techniques
Log files are created by devices or systems in order to provide information about processes or actions that were performed. Detailed inspection of security logs can reveal potential security breaches and it can show us system weaknesses. In our work we propose a novel anomaly-based detection approach based on data mining techniques for log analysis. Our approach uses Apache Hadoop technique to ...
متن کاملAnomaly Based Network Intrusion Detection by using Data Mining
As network attacks have increased in number and severity over the past few years, intrusion detection system (IDS) is increasingly becoming a critical component to secure the network. Due to large volumes of security audit data as well as complex and dynamic properties of intrusion behaviors, optimizing performance of IDS becomes an important open problem that is receiving more and more attenti...
متن کاملAnomaly Detection in Network Using Data Mining Algorithms
In today’s world the security of computer system is of great concern. Because the last few years have seen a dramatic increase in the number of attacks, intrusion detection has become the mainstream of information insurance. Firewalls provide some protection. They do not provide full protection and still need to be complimented by an intrusion detection system. Data mining techniques are a new ...
متن کاملHybrid Approach for Detection of Anomaly Network Traffic using Data Mining Techniques
Anomaly based Intrusion Detection System (IDS) is getting popularity due to its adaptability to the changes in the behavior of network traffic as it has the ability to detect the new attacks. As it is very difficult to set any predefined rule for identifying correctly attack traffic since there is no major difference between normal and attack traffic. In this paper, Anomaly traffic detection sy...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: VFAST Transactions on Software Engineering
سال: 2016
ISSN: 2309-3978
DOI: 10.21015/vtse.v9i2.403