StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Analyzing and contrasting data mining based network intrusion detection - Thesis Example

Cite this document
Summary
In this thesis, some systems are discussed that can be used for detecting network intrusions by data network and host data mining. It also covers the different types of network intrusions and how they can be best detected using available data mining tools. Data mining can be a very useful methodology for identifying any intrusion that might have taken place…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.9% of users find it useful
Analyzing and contrasting data mining based network intrusion detection
Read Text Preview

Extract of sample "Analyzing and contrasting data mining based network intrusion detection"

Download file to see previous pages

In this age of the Information Revolution, there are obvious advantages that can be reaped from the vast and ever growing Internet Community of the web: 24/7 connectivity; robust e-commerce that simplified business transactions and operations; erasure of geographical separation and distance; and access to a multitude of modern means of communications. Yet, as the benefits derived from being part of the Internet community are numerous to mention, one resounding concern that pervades this virtual world is security.

Most, if not all, entities that are part of the Internet world are on their toes, keeping an eye on their own virtual space on the Internet. Security is an important word in the Internet today. There are many people actively involved in developing attack software and are ready to attack anyone and any site that has a vulnerability in its network security setup. As defenses are developed, the attack software is modified to adapt to those defenses and launch even more deadly attacks. These attacks not only stop people from using their computer systems but some are also designed to damage the target computers or the data that they store.

Since many e-commerce companies and enterprises depend on the Internet for their survival, it is not a surprise that there is an interest in finding different way to protect one’s network.. s age of the Information Revolution, there are obvious advantages that can be reaped from the vast and ever growing Internet Community of the web: 24/7 connectivity; robust e-commerce that simplified business transactions and operations; erasure of geographical separation and distance; and access to a multitude of modern means of communications.

Yet, as the benefits derived from being part of the Internet community are numerous to mention, one resounding concern that pervades this virtual world is security. Most, if not all, entities that are part of the Internet world are on their toes, keeping an eye on their own virtual space on the Internet. Security is an important word in the Internet today. There are many people actively involved in developing attack software and are ready to attack anyone and any site that has a vulnerability in its network security setup.

As defenses are developed, the attack software is modified to adapt to those defenses and launch even more deadly attacks. These attacks not only stop people from using their computer systems but some are also designed to damage the target computers or the data that they store. Since many e-commerce companies and enterprises depend on the Internet for their survival, it is not a surprise that there is an interest in finding different way to protect one’s network. Over the past couple of decades, techniques to secure network through latest technology have gained an importance and have proven to be a necessity to any entity maintaining a network.

The need for security has spawned in the design of firewalls, cryptography, authentication and many different intrusion detection systems. Among these security tools, network intrusion detection systems hold the potential to become a tool against computer crime. An

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Analyzing and contrasting data mining based network intrusion Thesis”, n.d.)
Retrieved de https://studentshare.org/information-technology/1391033-analyzing-and-contrasting-data-mining-based
(Analyzing and Contrasting Data Mining Based Network Intrusion Thesis)
https://studentshare.org/information-technology/1391033-analyzing-and-contrasting-data-mining-based.
“Analyzing and Contrasting Data Mining Based Network Intrusion Thesis”, n.d. https://studentshare.org/information-technology/1391033-analyzing-and-contrasting-data-mining-based.
  • Cited: 0 times

CHECK THESE SAMPLES OF Analyzing and contrasting data mining based network intrusion detection

NLV Solutions: The Vend-O-Matic Brand

MARKETING PLAN: NLV Solutions: The Vend-O-Matic™ Brand EXECUTIVE SUMMARY NLV Solutions operates under the Vend-O-Matic brand, a business model supported by a family-based culture that is, today, ineffective in responding according to market characteristics.... The logo utilised to make Vend-O-Matic stand out is based on retro-style signage common during the boom in automats in the 1960s to inspire nostalgic-based consumption behaviours.... The methodology by which the company provides talent management through family-based channels is ineffective for response to changing market conditions that continues to erode profitability for this brand....
14 Pages (3500 words) Essay

Information System Selection, acquisition and implementation in banks

Artificial intelligence, in the pretext of knowledge-based systems is on the point of delivering its long awaited potential.... The paper “Information System Selection, acquisition and implementation in banks” presents an effort for analysis of the theory in the field of the Customer Relationship Management which is very vital for a bank in order to maintain its relationship with its customers....
66 Pages (16500 words) Thesis

Effects on Migration of Labor Market

Taking into account the integration of Romania into the European Union, this study attempts to look at the real effects of the last decade's political development on the Romanian economy and the labor market; whether or not there have been any short-term and long-term benefits… In this light, this study concentrates on the analysis of one of the leading Romanian industries – hotel hospitality. The synthesis of this study covers the aspects of the state of the labor market and the extent to which the EU membership Thus, conclusions are directed towards the development of the hospitality industry and the labor market in Bucharest....
40 Pages (10000 words) Thesis

Research Methods for Business Students

One of these approaches is data mining, whereby data… existing and potential customers is observed keenly for trends and dependencies that would enable firms to predict and satisfy customer needs with considerable accuracy.... Though data mining is one of the best approaches to achieving a competitive edge, it is not clear which Moreover, some attempts at acquiring data from customers have resulted in unethical behavior, most of which are the prime target of customer privacy policies....
20 Pages (5000 words) Research Paper

Barriers to uptake of HIV/AIDS testing services

The section also gives the prelude on how data will be collected in the field as well as the sampling procedures that will be used in obtaining the desired population for the study.... A detailed technique of raw data analysis and presentation is also indicated in the chapter....
15 Pages (3750 words) Research Paper

Research for Health Project

The section also gives the prelude on how data will be collected in the field as well as the sampling procedures that will be used in obtaining the desired population for the study.... A detailed technique of raw data analysis and presentation is also indicated in the chapter....
20 Pages (5000 words) Research Paper

The Economic Downturn Effects on I.T Projects in Singapore

For example, a tender to provide passive fiber grid for the next generation of the national broadband network in Singapore was awarded in September 2008.... The government committed itself towards extending a grant of S$750 million to the contracted company so as to support the network implementation (James 2009) in the hope of opening up several opportunities along the way for many other I....
12 Pages (3000 words) Case Study

Tilt-Up Panel Applications

The objective of this paper “Tilt-Up Panel Applications” includes assessing the historical background of the technique, evaluation of the extents to which the methods been applied in Australia,  assessing the mechanical and structural analysis of the tilt panels.... hellip; The main aims of tilt-up panels entailed construction indicates a proven technique for erecting office buildings, distribution centres, retail centres, warehouses call centres, commercial structures manufacturing facilities and industrial structures with increased rate, enhanced safety and subsequent awesome construction-oriented cost benefits....
20 Pages (5000 words) Thesis
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us