Download now Free registration required
The network resources are consumed by variety of users. The attackers disrupt the network resources. Different Intrusion Detection schemes are used to detect network attacks. The Denial of Service Attacks (DoS), Probe, User To Remote (U2R) and Remote To Local (R2L) are some of the common attacks that affects network resources. Data mining techniques are used to detect network intrusions. Various classification techniques are used for intrusion detection process. The anomaly and signature based intrusion detection schemes are used for Intrusion Detection process. The layered approach with conditional random fields is used for anomaly based classification model. The signature based model uses the SNORT signature database. This system integrates the anomaly based and signature based models.
- Format: PDF
- Size: 133.7 KB