ANN for misuse detection
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
project topics
Active In SP
**

Posts: 2,492
Joined: Mar 2010
#1
03-04-2010, 05:45 PM


Intrusion Detection Systems

The timely and accurate detection of computer and network system intrusions has always been an elusive goal for system administrators and information security researchers. The individual creativity of attackers, the wide range of computer hardware and operating systems, and the ever changing nature of the overall threat to target systems have contributed to the difficulty in effectively identifying intrusions. While the complexities of host computers already made intrusion detection a difficult endeavor, the increasing prevalence of distributed network-based systems and insecure networks such as the Internet has greatly increased the need for intrusion detection.

Because of the increasing dependence which companies and government agencies have on their computer networks the importance of protecting these systems from attack is critical. A single intrusion of a computer network can result in the loss or unauthorized utilization or modification of large amounts of data and cause users to question the reliability of all of the information on the network. There are numerous methods of responding to a network intrusion, but they all require the accurate and timely identification of the attack.

There are two general categories of attacks which intrusion detection technologies attempt to identify - anomaly detection and misuse detection .Anomaly detection identifies activities that vary from established patterns for users, or groups of users. Anomaly detection typically involves the creation of knowledge bases that contain the profiles of the monitored activities.

The second general approach to intrusion detection is misuse detection. This technique involves the comparison of a user's activities with the known behaviors of attackers attempting to penetrate a system. While anomaly detection typically utilizes threshold monitoring to indicate when a certain established metric has been reached, misuse detection techniques frequently utilize a rule-based approach. When applied to misuse detection, the rules become scenarios for network attacks. The intrusion detection mechanism identifies a potential attack if a user's activities are found to be consistent with the established rules. The use of comprehensive rules is critical in the application of expert systems for intrusion detection.

Current approaches to intrusion detection systems

Most current approaches to the process of detecting intrusions utilize some form of rule-based analysis. Rule-Based analysis relies on sets of predefined rules that are provided by an administrator, automatically created by the system, or both. Expert systems are the most common form of rule-based intrusion detection approaches. The early intrusion detection research efforts realized the inefficiency of any approach that required a manual review of a system audit trail. While the information necessary to identify attacks was believed to be present within the voluminous audit data, an effective review of the material required the use of an automated system.

The use of expert system techniques in intrusion detection mechanisms was a significant milestone in the development of effective and practical detection-based information security systems.

An expert system consists of a set of rules that encode the knowledge of a human "expert". These rules are used by the system to make conclusions about the security-related data from the intrusion detection system. Expert systems permit the incorporation of an extensive amount of human experience into a computer application that then utilizes that knowledge to identify activities that match the defined characteristics of misuse and attack.
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
NIRSEE
Active In SP
**

Posts: 8
Joined: Jul 2010
#2
13-07-2010, 11:20 PM

PLEASE SEND ME FULL REPORT
Reply
chtr.ks
Active In SP
**

Posts: 1
Joined: Jul 2010
#3
14-07-2010, 12:32 PM

please send me the complete report as well as the code that is used.
Reply
repo
Active In SP
**

Posts: 2
Joined: Sep 2010
#4
09-09-2010, 08:17 PM

plss send me full seminar and presentation report on ANN for misuse detection as soon as possible plss.. i have seminar and presentation on monday i.e. on 13 sept 2010.. so kindly send me full seminar and presentation report before saturday.. plss..
Reply
repo
Active In SP
**

Posts: 2
Joined: Sep 2010
#5
09-09-2010, 08:17 PM

plss send me full seminar and presentation report on ANN for misuse detection as soon as possible plss.. i have seminar and presentation on monday i.e. on 13

sept 2010.. so kindly send me full seminar and presentation report before saturday.. plss..
Reply
repo
Active In SP
**

Posts: 2
Joined: Sep 2010
#6
09-09-2010, 08:17 PM

plss send me full seminar and presentation report on ANN for misuse detection as soon as possible plss.. i have seminar and presentation on monday i.e. on 13 sept 2010.. so kindly send me full seminar and presentation report before saturday.. plss..
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  DETECTION OF LOST MOBILE USING SNIFFERS seminar class 64 33,863 12-04-2016, 03:24 PM
Last Post: mkaasees
  power theft detection via plc pdf jaseelati 0 333 22-01-2015, 03:31 PM
Last Post: jaseelati
  network intrusion detection system project report doc jaseelati 0 366 13-01-2015, 01:15 PM
Last Post: jaseelati
  deadlock detection algorithm source code c jaseelati 0 272 10-01-2015, 02:18 PM
Last Post: jaseelati
  bomb detection robotics using embedded controller jaseelati 0 322 06-01-2015, 04:50 PM
Last Post: jaseelati
  network intrusion detection system project report jaseelati 0 245 23-12-2014, 03:08 PM
Last Post: jaseelati
  A MODERN MICROWAVE LIFE DETECTION SYSTEM FOR HUMAN BEING BURIED UNDER RUBBLE ppt seminar flower 3 1,715 28-08-2013, 09:31 AM
Last Post: study tips
  BOMB DETECTION ROBOT seminar flower 5 4,906 19-07-2013, 07:18 PM
Last Post: Guest
  Paper presentation on POWER THEFT DETECTION study tips 0 387 04-05-2013, 04:23 PM
Last Post: study tips
  Embedded system for Hazardous Gas detection and Alerting pdf study tips 0 348 02-05-2013, 12:37 PM
Last Post: study tips