Data mining techniques in intrusion detection: tightening network security.

Ndumiyana, David (2013) Data mining techniques in intrusion detection: tightening network security.

Full text not available from this repository.
Official URL: http://hdl.handle.net/11196/251

Abstract

In any part of business environment, providing adequate protection of company networked resources is extremely important. Intrusion detection systems which should provide the pillar of strength for infrastructural defence against any form of malicious activity had been found wanting in that mandate: alerting the administrators and network managers in case of severe violation of the company security policy. The reason emanates from the increase in the number of false alarms which makes the system to operate at weaker levels. The biggest challenge facing intrusion detection systems today is dealing with both an attempted attack and a successfully launched attack. This paper develops data mining - based model of intrusion detection system on both Network Intrusion Detection to monitor all network traffic passing on segment, where a detector is installed to alert the administrator of any signature based activity or suspicious anomaly, and Host Intrusion Detection to monitor inbound and outbound packets from a network device,and will alert the user or network administrator of suspicious behaviour detected. The model designed addresses negative effects of its weaknesses so as to enhance operational effectiveness. The importance of intrusion detection systems and the old techniques, type, characteristics and limitations would be given special attention in this research.

Item Type: Article
Uncontrolled Keywords: Data mining techniques, intrusion detection system, false alarms, false negatives, network security.
Divisions: Universities > State Universities > Bindura University of Science Education
Depositing User: Mr. Edmore Sibanda
Date Deposited: 07 Jul 2016 13:02
Last Modified: 07 Jul 2016 13:02
URI: http://researchdatabase.ac.zw/id/eprint/3171

Actions (login required)

View Item View Item