PJST 2 JUNE.pmd

نویسنده

  • Anshuman Sharma
چکیده

Research in the field of computer and network sciences demands for tools and methodology to test their security effectively. Intrusion Detection System is used to perform the same with a fact that an intruder’s behavior will be noticeably different from that of a legitimate user and would exploit security vulnerabilities. IDS have thousands of alerts per day; some are mistakenly triggered by begin events. This make it extremely difficult to correctly identify alerts related to attack. The use of artificial immune systems in intrusion detection is an appealing concept for two reasons .Firstly the human immune system provides the human body with a high level of protection from invading pathogens in a robust, self organized and distributed manner. Secondly, current techniques used in computer security are not able to cope with the dynamic and increasingly complex nature of computer systems and their security. This research paper proposes a neural network approach to building network-based IDS, which is inspired by a artificial immune system to find the unseen or unknown attack. This paper will describe our efforts to determine if pattern recognition can serve to add to the adaptability of network intrusion detectors and improve the response time between intrusion and detection. We will look at several systems of pattern recognition to identify from them the most viable techniques and highlight the problems that exist in using pattern recognition and classification. Keyword: Intrusion detection system. Pattern Recognition

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

PJST 2 JUNE.pmd

A work on neural network and fuzzy logic based technique for solving the problem of unit commitment in any electric utility is presented in this paper. The effectiveness of economic dispatch is well understood when the objective is to schedule the committed generators to meet the load, maintain voltages and frequency within prescribed tolerances and minimize operating cost without unduly stress...

متن کامل

PJST 2 JUNE.pmd

Worldwide Interoperability for Microwave Access (WiMAX) is a telecommunications technology providing wireless data, voice and videos over long distances with efficiency.” The main goal of WiMAX is to deliver wireless communications with security or it can be said that security is the major issue in WiMAX networks. In this study, different cryptographic techniques like Advanced Encryption Standa...

متن کامل

PJST 2 JUNE.pmd

The aim of this experimental work was to achieve improvement the thermal efficiency of LPG stove and to save fuel. Due to the shortage of petroleum resources and its high prices, it is the duty of each and every person to save it. Most of the families in rural areas use wood or cow-dung for cooking purposes but it is not possible in urban areas. In urban areas, 90% houses consume LPG, as its us...

متن کامل

Dataset. Relationship between Urinary Level of Phytate and Valvular Calcification in an Elderly Population: a Cross-Sectional Study

Subject Urinary volume (mL) pH Phytate (mg/L) SEM Age (years) Sex (H:male; M:female) Height (m) Weight (kg) BMI (kg/m2) Diabetes_ 1yes_2not HTA_ 1yes_ 2not HCol_ 1yes_ 2not IRC_1 yes_2 not RenalLit _1yes_2 not ACV_ 1yes_ 2not IAM_ 1yes_ 2not EVPer_ 1yes_2 not Artr _1ye s_2n ot OPor. _1yes _2not Gout_ 1yes_ 2not C.Colon_ 1yes_2no t Cancer_ 1yes_2n ot AAS_ 1yes _2no t Ticlopid._ 1yes_2no t Estati...

متن کامل

Feature Extraction of Artificial Tongue Data Using Gram-schmidt Orthonormalization

,# / # ) # @ ) # ) # & & & 2 & # )) ) 2 ; = ) $ B C D # # 2 $ / ) & # $ ) / # 2 E @ C(D # # ,# ) ) / # 2 # @ # & ) ) 2# # / 2 # # C%D # # 2 & ) $ ) $ / , # # $ # # ) ) * + $ / 2 # $ # / / B @ C8D # @ 2 ) ) 2 # / = # ) / ) # 2 2 # @ ) 2 # # # A / / * # + ) = # ) / # $ # ) # $ $ ) ) # / 2 2 # ) # / 2 / / 2 # # ,# / / # ) ) # )) = # # / ) / C!D ,# # # / ) # # # = ; # # # # )) # & $ / ; # F 2 # $ 2...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012