An Intrusion Detection System implementing Host based attacks using Layered Framework

Intrusion Detection System has become a core component in a computer network as it is having threats from attackers, spammers and also from criminal enterprises. This insecurity is increasing in online environment day by day. The system must be secure from these prevalence. This paper represents an Intrusion Detection System implementing Real Time Host based attacks using Layered Framework. This system is experimented with real time packets. As we have experimented, it provides high security and less false alarm rate.

[1]  Akhilesh Swarup,et al.  Neural network approach for intrusion detection , 2009, ICIS.

[2]  Zhilin Feng,et al.  Analysis and Design for Intrusion Detection System Based on Data Mining , 2010, 2010 Second International Workshop on Education Technology and Computer Science.

[3]  A. Abraham,et al.  Intrusion Detection Systems Using Decision Trees and Support Vector Machines , 2004 .

[4]  Chuanyi Ji,et al.  Combinations of Weak Classifiers , 1996, NIPS.

[5]  R. K. Challa,et al.  Novel intrusion detection system integrating layered framework with neural network , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).

[6]  S. T. Sarasamma,et al.  Hierarchical Kohonenen net for anomaly detection in network security , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[7]  Dewan Md. Farid,et al.  Attacks classification in adaptive intrusion detection using decision tree , 2010 .

[8]  Robert K. Cunningham,et al.  Improving Intrusion Detection Performance using Keyword Selection and Neural Networks , 2000, Recent Advances in Intrusion Detection.

[9]  Eugene H. Spafford,et al.  An architecture for intrusion detection using autonomous agents , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).

[10]  E. Bloedorn,et al.  Data mining for network intrusion detection : How to get started , 2001 .

[11]  Iftikhar Ahmad,et al.  Performance comparison between backpropagation algorithms applied to intrusion detection in computer network systems , 2008 .

[12]  Kotagiri Ramamohanarao,et al.  Layered Approach Using Conditional Random Fields for Intrusion Detection , 2010, IEEE Transactions on Dependable and Secure Computing.