Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Host-Based Intrusion Detection System Using Analytics

Author : G.Yedukondalu 1 Dr.J.Anand Chandulal 2 Dr.M. Srinivasa Rao 3

Date of Publication :1st March 2017

Abstract: File signatures are computed to improve the efficiency and effectiveness of the Intrusion Detection System. File Signatures are generated using Hashing Method and Superimposed Coding technique. This paper discusses the techniques that works fast and efficiently in detecting the malicious users. DARPA data set is used to apply these techniques to find out the intruders through IDS. The performance of the similarity search algorithm is efficient since all the signatures are in the binary format and computations are done by low level logical operations[1]. Clustering and Similarity search techniques are applied to increase the efficiency of the Host-Based Intrusion Detection System

Reference :

    1. Conference on Fuzzy Systems, 2004, pp. 691-696. Sanjay Rawat, "On the use of Singular Value Decomposition for Fast Intrusion Detection System" In Proceedings- published in Electronic Note in Theoretical Computer Science URL: http://www.elsevier.nl/locate/entcs.
    2. Sanjay Rawat, "Intrusion Detection System using text processing with Binary-Weighted Cosine Metric ", In Proceedings: published in Eelectronic Notes in Theoretical Computer URL:http://www.elsevier.nl/locate/entcs.
    3. Subrat Kumar Dash, Sanjay Rawat, G. Vijaya Kumari and Arun K. Pujari, ―Masquerade Detection Using IA Network‖, First International Conference on Emerging Trends in Engineering and Technology, pp 504-507, IEEE, 2008
    4. Hind Tribak , Blanca L. Delgado-Marquez, P.Rojas, O.Valenzuela, H. Pomares and I. Rojas, ― Statistical Analysis of Different Artificial Intelligent Techniques applied to Intrusion Detection System‖, IEEE, 2012
    5. S. Revathi and A. Malathi, ―Data Preprocessing for Intrusion Detection System using Swarm Intelligence Techniques‖, International Journal of Computer Applications , Volume 75– No.6, August 2013  Iwan Syarif, Adam Pruge Bennett and Gary Wills, ―Unsupervised clustering approach for network anomaly detection
    6. Faloutsos.C.―Access methods for text‖ , ACMComputing Surveys.1985,
    7. Sreenivasa Rao, M., Pujari, A. K., Sreenivasan, B.―A new neural network architecture for efficient close proximity match of large databases”. IEEE Computer Society Press, Proceedings of the Eighth International Workshop on DEXA, France,Edited by R. R. Wanger, 444- 449, 1997.
    8. S. B. Needleman and C.D. Wunch.‖A general method applicable to the search for similarities in the amino acid sequences of two proteins.Journal of Molecular Biology ―, 1970.
    9. Shang ,H. ,Merrettal ,T. H.,‖Tries for Approximate String Matching knowledge“, IEEE trans on ge and data Engineering ,1996.
    10. Bethina Schmitt and

Recent Article