Unleashing Power of Artificial Intelligence for Network Intrusion Detection Problem

The paper proposes a scheme/technique to shun corrupted data packet as they journey towards it destination by appropriately identifying the corrupted data packets or sets and filtering them before they reach or make an entry to the last lap/phase of their destination. As most bit and bytes (data packets) journey the express way (internet) towards destination travelling through various networks & networking devises, components etc., get infected. Infections of various types, for example in the form of virus and worms attach during journey and piggy-back the data packets to destination; at the end causing chaos and corruption into the destination systems.

Provided by: International Journal of Engineering Science and Technology (IJEST) Topic: Security Date Added: Oct 2010 Format: PDF

Find By Topic