scispace - formally typeset
Proceedings ArticleDOI: 10.1109/IEMCON.2018.8614842

Data Intrusion Detection with basic Python coding and prevention of other intrusive manifestation by the use of intrusion application

01 Nov 2018-
Abstract: A model of an ongoing interruption location master framework fit for recognizing break-ins, entrances and different types of PC mishandle is portrayed. The model depends on the speculation that security infringement can be identified by checking a framework's review records for unusual examples of framework utilization. The program on interruption discovery will have the capacity to distinguish whether a site, which for instance requires our client ID and secret word, is dependable or not. The model is autonomous of a specific framework, application condition. Framework defenselessness, or sort of interruption, in this manner giving a structure to a broadly useful interruption recognition master framework.

...read more

Citations
  More

Open accessDissertation
29 Jan 2020-
Abstract: The growing smartphone technology and emerging mobile cloud technology are the latest wireless technology. Mobile cloud computing has many of the advantages that look forward to the future and it's also simple for hackers to take full control of many other users Privacy of Data. While data security is expected to be secured, the main drawback for users when the computer is connected to the internet it's not that difficult for an intruder to engage in a data theft on the required target. So, for providing better security the combination of Hybrid Intrusion Detection System (HyInt) and Honeypot networks is thus implemented into Mobile Cloud Environment with the significant purpose of mitigating unidentified and known attacks in order to provide security. Execution of the research work provides a pure perspective of the security and quality products of the algorithm that was not included in the previous research work. As part of the research work, intensive statistical analysis was performed to prove the consistency of the proposed algorithm. The implementation and evaluation outcome offers clear potential for any further research work in the cloud-based Intrusion Detection System. The implemented algorithm can be used for high-security cloud environment that is developed for army and banking purposes to monitor the network's activities effectively.

...read more

Topics: Mobile cloud computing (68%), Cloud computing (63%), Honeypot (60%) ...read more
References
  More

Proceedings ArticleDOI: 10.1145/1980022.1980076
S. N. Dhage1, Bandu B. Meshram1, Romil Rawat1, S. Padawe1  +2 moreInstitutions (1)
25 Feb 2011-
Abstract: In recent years, with the growing popularity of cloud computing, security in cloud has become an important issue. As "Prevention is better than cure", detecting and blocking an attack is better than responding to an attack after a system has been compromised. This paper proposes architecture capable of detecting intrusions in a distributed cloud computing environment, and safeguarding it from possible security breaches. It deploys a separate instance of IDS for each user and uses a single controller to manage the instances. IDS in this architecture can use signature based as well as learning based method.

...read more

91 Citations


Open accessJournal ArticleDOI: 10.5121/IJCSIT.2011.3607
Ahmed E. Youssef1, Ahmed Emam1Institutions (1)
Abstract: Intrusion detection has become a critical component of network administration due to the vast number of attacks persistently threaten our computers. Traditional intrusion detection systems are limited and do not provide a complete solution for the problem. They search for potential malicious activities on network traffics; they sometimes succeed to find true security attacks and anomalies. However, in many cases, they fail to detect malicious behaviours (false negative) or they fire alarms when nothing wrong in the network (false positive). In addition, they require exhaustive manual processing and human expert interference. Applying Data Mining (DM) techniques on network traffic data is a promising solution that helps develop better intrusion detection systems. Moreover, Network Behaviour Analysis (NBA) is also an effective approach for intrusion detection. In this paper, we discuss DM and NBA approaches for network intrusion detection and suggest that a combination of both approaches has the potential to detect intrusions in networks more effectively.

...read more

35 Citations


Open accessJournal ArticleDOI: 10.1016/J.PROCS.2018.05.108
Abstract: Intrusion Detection Systems (IDS) are used in computer networks to safeguard the integrity and confidentiality of sensitive data. In recent years, network traffic has become sizeable enough to be considered under the big data domain. Current machine learning based techniques used in IDS are largely defined on eager learning paradigms which lose performance efficiency by trying to generalize training data before receiving queries thereby incurring overheads for trivial computations. This paper, proposes the use of lazy learning methodologies to improve overall performance of IDS. A novel heuristic weight based indexing technique has been used to overcome the drawback of high search complexity inherent in lazy learning. IBk and LWL, two popular lazy learning algorithms have been compared and applied on the NSL-KDD dataset for simulating a real-world like scenario and comparing their relative performances with hw-IBk. The results of this paper clearly indicate lazy algorithms as a viable solution for real-world network intrusion detection.

...read more

Topics: Lazy learning (75%), Eager learning (67%), Intrusion detection system (61%) ...read more

12 Citations

Performance
Metrics
No. of citations received by the Paper in previous years
YearCitations
20201