Author : G.Yedukondalu 1
Date of Publication :1st March 2017
Abstract: File signatures are computed to improve the efficiency and effectiveness of the Intrusion Detection System. File Signatures are generated using Hashing Method and Superimposed Coding technique. This paper discusses the techniques that works fast and efficiently in detecting the malicious users. DARPA data set is used to apply these techniques to find out the intruders through IDS. The performance of the similarity search algorithm is efficient since all the signatures are in the binary format and computations are done by low level logical operations[1]. Clustering and Similarity search techniques are applied to increase the efficiency of the Host-Based Intrusion Detection System
Reference :