StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Analyzing and contrasting data mining based network intrusion detection system - Essay Example

Cite this document
Summary
This thesis covers the different types of intrusions and justify how they can be best detected using available data mining tools. Data mining can be proved as a very useful method towards identifying any intrusion that might have taken place…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.9% of users find it useful
Analyzing and contrasting data mining based network intrusion detection system
Read Text Preview

Extract of sample "Analyzing and contrasting data mining based network intrusion detection system"

Download file to see previous pages

The objective of this research is to acquire a better insight about Data Mining-Based Network Intrusion Detection Systems. In this present era the computers are sophistically connected to each other in a form of network. In such networks there is every possibility of intrusion to important data. In order to maintain the integrity, network data has to be secured. Electronic commerce (e-commerce) has made Internet usage most important part in everyone’s life and has become a major source of sending and receiving information.

However, providing protection to the computers connected in a network is still a main issue to be tackled. In general, every organization wants their data to be safe and secure from the attackers. Information systems are easily accessible and can be intruded by the hackers over the internet if the networks are insecure. In this thesis, there are some procedures mentions for detecting network intrusions using data mining. This thesis also covers the different types of intrusions and justify how they can be best detected using available data mining tools.

Data mining can be proved as a very useful method towards identifying any intrusion that might have taken place. The amount of extraction or hacking of data and intrusions are growing day by day. As a result, new intelligent Intrusion Detection Systems (IDSs) are put in place to mitigate the intrusion and safeguard the data. Intrusion needs to be detected as we cannot stop intrusions but we can minimize them and stop hackers from threats. Declaration I certify that this thesis is carried out in partial fulfillment of the requirements for the degree of Masters in Computer Science, and has no contents copied from any external sources except for those whose references are made with in the text.

---------------------------------- ------------- Mohammed Altaf Ahmed khan Date Table of Contents List of Figures Figure 2.1: Transition from Data to Knowledge (Fayyad, Piatetsky and Smyth, 1996) 10 Figure 3.1 Snort High-Level Processing Stages (Wheeler, 2003)……………………………20 Figure 3.2 Bayesian Model Diagram Panda & Patra (2007)…………………………………….25 Chapter 1 Introduction In this age of the Information Revolution, there are obvious advantages that can be reaped from the vast and ever growing Internet Community in the web: 24/7 connectivity; robust e-commerce that simplified business transactions and operations; erasure of geographical separation and distance; and access to a multitude of modern means of communications.

Yet, as benefits derived from being part of the Internet community are many to mention, one resounding concern that pervades this virtual world is security. Most, if not all, entities participating and part of the Internet world are on their toes, keeping their eyes over their own virtual place in the Internet. It can be said that SECURITY is one big important word in the Internet today. As of this press time, there are many unscrupulous entities that crowd the Internet and are ready to attack anyone and any site that has vulnerability in its network security setup.

Since many e-commerce companies and enterprises depend on the Internet for its survival, it is not a surprise that there is a creation and formulation of different way to protect one’s network. Over the past couple of decades, techniques to secure network through latest technology have gained an importance and have proven to be a necessity to any entity maintaining and securing a network. The need for security has spawned in the creation and design of firewalls, cryptography, authentication and most of all intrusion detection systems.

Among these security tools, network intrusion detection system holds a potential as a tool against computer crime. An intrusion detection system can simply be called the process of monitoring and analyzing the events (ie. the traffic of packets going in and out of the network stream) that occurs in a computer system to enable to detect signs of security problems. Yet, as a network security technology tool, intrusion detecti

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Analyzing and contrasting data mining based network intrusion Essay”, n.d.)
Retrieved de https://studentshare.org/information-technology/1391367-analyzing-and-contrasting-data-mining-based
(Analyzing and Contrasting Data Mining Based Network Intrusion Essay)
https://studentshare.org/information-technology/1391367-analyzing-and-contrasting-data-mining-based.
“Analyzing and Contrasting Data Mining Based Network Intrusion Essay”, n.d. https://studentshare.org/information-technology/1391367-analyzing-and-contrasting-data-mining-based.
  • Cited: 0 times

CHECK THESE SAMPLES OF Analyzing and contrasting data mining based network intrusion detection system

Information System Selection, acquisition and implementation in banks

The paper “Information system Selection, acquisition and implementation in banks” presents an effort for analysis of the theory in the field of the Customer Relationship Management which is very vital for a bank in order to maintain its relationship with its customers.... Artificial intelligence, in the pretext of knowledge-based systems is on the point of delivering its long awaited potential....
66 Pages (16500 words) Thesis

Effects on Migration of Labor Market

Taking into account the integration of Romania into the European Union, this study attempts to look at the real effects of the last decade's political development on the Romanian economy and the labor market; whether or not there have been any short-term and long-term benefits… In this light, this study concentrates on the analysis of one of the leading Romanian industries – hotel hospitality. The synthesis of this study covers the aspects of the state of the labor market and the extent to which the EU membership Thus, conclusions are directed towards the development of the hospitality industry and the labor market in Bucharest....
40 Pages (10000 words) Thesis

Research Methods for Business Students

One of these approaches is data mining, whereby data… existing and potential customers is observed keenly for trends and dependencies that would enable firms to predict and satisfy customer needs with considerable accuracy.... Though data mining is one of the best approaches to achieving a competitive edge, it is not clear which Moreover, some attempts at acquiring data from customers have resulted in unethical behavior, most of which are the prime target of customer privacy policies....
20 Pages (5000 words) Research Paper

Network Security-Intrusion Detection System

The essay "Network Security-intrusion detection system" will try to look at the two processes Host-based and Network-based Intrusion Detection Systems, how effective these two approaches for the intrusion detection system for any organization and will also cover various guidelines for Intrusion Detection Systems deployment, operation, and maintenance.... In this paper definition and description of intrusion, intrusion detection, and intrusion detection system are covered....
16 Pages (4000 words) Essay

The Economic Downturn Effects on I.T Projects in Singapore

For example, a tender to provide passive fiber grid for the next generation of the national broadband network in Singapore was awarded in September 2008.... The government committed itself towards extending a grant of S$750 million to the contracted company so as to support the network implementation (James 2009) in the hope of opening up several opportunities along the way for many other I....
12 Pages (3000 words) Case Study

Network-Based Intrusion Detection System

This report "Network-Based intrusion detection system" demonstrates a proposed digital surveillance system for the security and protection of critical assets of the organization.... For detecting potential and current threats, intrusion detection systems will be considered.... In this global technological evolution of the digital era, every organization protects digital data by deploying hardware or software-based firewalls, security appliances such as intrusion detection systems, and other dedicated hardware....
8 Pages (2000 words) Report

Tilt-Up Panel Applications

The objective of this paper “Tilt-Up Panel Applications” includes assessing the historical background of the technique, evaluation of the extents to which the methods been applied in Australia,  assessing the mechanical and structural analysis of the tilt panels.... hellip; The main aims of tilt-up panels entailed construction indicates a proven technique for erecting office buildings, distribution centres, retail centres, warehouses call centres, commercial structures manufacturing facilities and industrial structures with increased rate, enhanced safety and subsequent awesome construction-oriented cost benefits....
20 Pages (5000 words) Thesis

Enhanced Sensor-Based Intrusion Detection System

This report "Enhanced Sensor-Based intrusion detection system" exhibits the usefulness of Anomaly and Signature-based IDS alongside its favorable circumstances and inconveniences.... Anomaly-based intrusion detection system, a Signature-based intrusion detection system, a Flexible Intrusion Detection, and Response Framework for Active Networks (FIDRAN) are suggested to give superior security.... ccording to the network dictionary, IDS is characterized as an "intrusion detection system (IDS) is a sort of security administration system for PCs and systems....
15 Pages (3750 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us