Download now Free registration required
The network security system plays a major role in the communication world, here every one's need security and assurance for their communication. Normally the hacking, Intrusion software's are using threats, malicious to enter in to the network and they are keep recording or monitoring the communication for this action the hackers may use following techniques Rexd, Rsh, Defult account/Null password, Generic Recon Mechanisms, NIS (Formerly yp), and Rpc Portmapper. The normal firewalls can address only insider threats. The main focus of the authors' research is applied on two different platforms, the first one is processing on TCP-Dump portion using KDDCUP99 data set and mining, the second one is finding of best algorithm for data mining Intrusion on UNIX.
- Format: PDF
- Size: 356.55 KB