Network Anomalies Detection Using Statistical Technique : A Chi-Square Approach

Intrusion Detection System is used to detect suspicious activities is one form of defense. However, the sheer size of the network logs makes human log analysis intractable. Furthermore, traditional intrusion detection methods based on pattern matching techniques cannot cope with the need for faster speed to manually update those patterns. Anomaly detection is used as a part of the intrusion detection system, which in turn use certain data mining techniques. Data mining techniques can be applied to the network data to detect possible intrusions. The foremost step in application of data mining techniques is the selection of appropriate features from the data.

Provided by: International Journal of Computer Science Issues Topic: Security Date Added: Mar 2012 Format: PDF

Find By Topic