Contact Us
Sign In / Sign Up for FREE
Go to advanced search...

Analyzing and contrasting data mining based network intrusion detection system - Essay Example

Comments (1) Cite this document
This thesis covers the different types of intrusions and justify how they can be best detected using available data mining tools. Data mining can be proved as a very useful method towards identifying any intrusion that might have taken place…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98.2% of users find it useful
Analyzing and contrasting data mining based network intrusion detection system
Read TextPreview

Extract of sample "Analyzing and contrasting data mining based network intrusion detection system"

Download file to see previous pages The objective of this research is to acquire a better insight about Data Mining-Based Network Intrusion Detection Systems. In this present era the computers are sophistically connected to each other in a form of network. In such networks there is every possibility of intrusion to important data. In order to maintain the integrity, network data has to be secured. Electronic commerce (e-commerce) has made Internet usage most important part in everyone’s life and has become a major source of sending and receiving information. However, providing protection to the computers connected in a network is still a main issue to be tackled. In general, every organization wants their data to be safe and secure from the attackers. Information systems are easily accessible and can be intruded by the hackers over the internet if the networks are insecure. In this thesis, there are some procedures mentions for detecting network intrusions using data mining. This thesis also covers the different types of intrusions and justify how they can be best detected using available data mining tools. Data mining can be proved as a very useful method towards identifying any intrusion that might have taken place. The amount of extraction or hacking of data and intrusions are growing day by day. As a result, new intelligent Intrusion Detection Systems (IDSs) are put in place to mitigate the intrusion and safeguard the data. Intrusion needs to be detected as we cannot stop intrusions but we can minimize them and stop hackers from threats. Declaration I certify that this thesis is carried out in partial fulfillment of the requirements for the degree of Masters in Computer Science, and has no contents copied from any external sources except for those whose references are made with in the text. ---------------------------------- ------------- Mohammed Altaf Ahmed khan Date Table of Contents List of Figures Figure 2.1: Transition from Data to Knowledge (Fayyad, Piatetsky and Smyth, 1996) 10 Figure 3.1 Snort High-Level Processing Stages (Wheeler, 2003)……………………………20 Figure 3.2 Bayesian Model Diagram Panda & Patra (2007)…………………………………….25 Chapter 1 Introduction In this age of the Information Revolution, there are obvious advantages that can be reaped from the vast and ever growing Internet Community in the web: 24/7 connectivity; robust e-commerce that simplified business transactions and operations; erasure of geographical separation and distance; and access to a multitude of modern means of communications. Yet, as benefits derived from being part of the Internet community are many to mention, one resounding concern that pervades this virtual world is security. Most, if not all, entities participating and part of the Internet world are on their toes, keeping their eyes over their own virtual place in the Internet. It can be said that SECURITY is one big important word in the Internet today. As of this press time, there are many unscrupulous entities that crowd the Internet and are ready to attack anyone and any site that has vulnerability in its network security setup. Since many e-commerce companies and enterprises depend on the Internet for its survival, it is not a surprise that there is a creation and formulation of different way to protect one’s network. Over the past couple of decades, techniques to secure network through latest technology have gained an importance and have proven to be a necessity to any entity maintaining and securing a network. The need for security has spawned in the creation and design of firewalls, cryptography, authentication and most of all intrusion detection systems. Among these security tools, network intrusion detection system holds a potential as a tool against computer crime. An intrusion detection system can simply be called the process of monitoring and analyzing the events (ie. the traffic of packets going in and out of the network stream) that occurs in a computer system to enable to detect signs of security problems. Yet, as a network security technology tool, intrusion detecti ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Analyzing and contrasting data mining based network intrusion Essay”, n.d.)
Retrieved de
(Analyzing and Contrasting Data Mining Based Network Intrusion Essay)
“Analyzing and Contrasting Data Mining Based Network Intrusion Essay”, n.d.
  • Cited: 0 times
Comments (1)
Click to create a comment or rate a document
kennith17 added comment 1 year ago
Student rated this paper as
The topic of "Analyzing and contrasting data mining based network intrusion detection system" is quite popular among the assignments in high school. Still, this example opens a new perspective of seeing the issue. I’ll use the idea for my own document.

CHECK THESE SAMPLES OF Analyzing and contrasting data mining based network intrusion detection system

Analyzing and contrasting data mining based network intrusion detection

...?Analyzing and Contrasting Data Mining-Based Network Intrusion Detection Systems In this modern era, computers are connected to each other using sophisticated networks. This dependence on computer networks leads to many different intrusion possibilities that threaten important data. In order to maintain the integrity of this data, it has to be secured. Electronic commerce (e-commerce) has made Internet usage a very important part in everyone’s life and has become a major means of sending and receiving...
48 Pages(12000 words)Thesis

Network Intrusion Detection and Forensics

...). The practice is still present today, but forms a much smaller portion of the modern day NIDS toolkit. At the turn of the century, a new and vital improvement, the neural network, became part of the NIDS. The artificial neural network was an addition to the logging systems and the statistical anomaly-based modes of detection present in the earlier forms of the intrusion systems. The addition of artificial neural networks facet to the NIDS system design mix marked the birth of the expert-based NIDSs. Recent developments in the field of internet security are largely...
26 Pages(6500 words)Dissertation

Intrusion Detection System possible using Snort. In an IP network, the packet flow and logging can be monitored with the help of Snort. It is designed by Source fire. It is one of the widely used IDS. Snort systems use various methods to detect the intrusion. It implements anomaly and heuristic approach to identify the intrusion. Snort came into existence in 1998. (Rehman 2003).It is composed of a rule based language with the combined operation of anomaly and signature IDS. It is popular due to its speed and performance. Snort can analyze the protocol from which the data is transferred. This IDS can also work as a normal...
14 Pages(3500 words)Essay

Network Intrusion Detection Systems

...Network Intrusion Detection systems Introduction Network Intrusion Detection systems are widely used andthey are one of the major component in a network. These systems help to prevent the intrusion and attacks by using a unique mechanism. Intrusion detection system detects and protects the network system from threats and attacks. It is the most important component of the network system. It is mandatory for the...
6 Pages(1500 words)Essay

Wireless Intrusion Detection Systems

...Set Identifier (SSID). Usually, this is done as a hobby and such hobbyists may combine the data with Global Positioning System (GPS) information to generate geographic maps of wireless networks in the area and their configurations. There are different software’s available for Wardriving, basing on the platform used. As a matter of fact, active software like NetStumbler, dStumbler, and MiniStumbler transmit probe request frames to extract responses from APs (Wright, 2002). This helps their probability of detecting APs. Another popular intrusion method is the Linux program AirSnort, most commonly used tool for WEP key extraction....
4 Pages(1000 words)Essay

Intrusion Detection hardware and software based system to identify unwanted efforts at accessing, disabling or manipulating computer systems, mostly in the course of a network, such as the Internet. These efforts can take the shape of attacks, as examples, in the form of malware, crackers or disgruntled workers (Bradley, 2009). An intrusion detection system is also utilized to identify numerous forms of malicious behaviors that are able to compromise the security as well as trust of a computer system. This comprise network attacks besides data driven attacks on applications, vulnerable...
2 Pages(500 words)Essay

Security Network Intrusion detection system (IDS)

...Network Intrusion Detection System Introduction Intrusion detection and prevention is vital when it comes to a network’s security. A network intrusion detection system (NIDS) keeps a check on the network traffic, signals when it encounters a security breach, a malicious activity or an attack, and obstructs the source IP address from accessing the network. Below is discussed a case study and important actions which become necessary in case of network intrusion. Case Study If I get an...
2 Pages(500 words)Essay

Intrusion Detection System

.... I shall find out if upgrades had been installed and were operational. It will also be important to investigate whether VPN had been established to protect the network from getting intruded and to reduce the security breach. I shall make arrangements for the continuity of network operations like preparing redundant system and obtaining data back-ups (State of California, 2009). I shall immediately inform the system administrator and all the concerned authorities that are associated with the sensitive information saved on the affected computer, such as, the credit card company as stated above. I shall review the firewall and intrusion...
2 Pages(500 words)Assignment

Intrusion Detection System

... Intrusion Detection System A system equipped to fight against firewall, malwares, and offers protection against viruses is not novice. This is because protecting the computer against these attacks is an essential part of computer management and protection policy. I agree with this argument of Justin concerning HIDS. HIDS is an intrusion detection system that screens and scrutinizes the internal parts of a computer system, and its own network interface. The system protects against attacks on the computer memory. QUESTION 2 I agree with this argument...
2 Pages(500 words)Assignment

Intrusion Detection Systems

A passive monitoring system transmits signals to the owner after a security breach by utilizing a sensor that detects any weird movement. The main advantage of a passive monitoring system is that the units can be deployed randomly minimizing the device attacks. Passive monitoring IDS cannot block suspicious signals on their own; an operator has to be available to block any potential threat. For Inline transmission, the IDS does not transmit signals to the owner rather it auto-responds to the malicious activity by reconstructing the connection to block communication from the suspicious source. The system is configured to automatically alter suspicious signals without any operation by the owner. Inline transmission IDS can block den...
2 Pages(500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Analyzing and contrasting data mining based network intrusion detection system for FREE!

Contact Us