A Novel Approach of Intrusion Detection System Through SADE in Data Mining
Journal Title: International Journal of Trend in Scientific Research and Development - Year 2018, Vol 2, Issue 6
Abstract
Intrusion Detection System IDS is a vital component of any network in today's world of Internet. IDS are an effective way to detect different kinds of attacks in interconnected network. An effective Intrusion Detection System requires high accuracy and detection rate as well as low false alarm rate. To tackle this growing trend in computer attacks and respond threats, industry professionals and academics are joining forces in order to build Intrusion Detection Systems IDS that combine high accuracy with low complexity and time efficiency. With the tremendous growth of usage of internet and development in web applications running on various platforms are becoming the major targets of attack. Security and privacy of a system is compromised, when an intrusion happens. Intrusion Detection System IDS plays vital role in network security as it detects various types of attacks in network. Implementation of an IDS is distinguishes between the traffic coming from clients and the traffic originated from the attackers or intruders, in an attempt to simultaneously mitigate the problems of throughput, latency and security of the network. Data mining based IDS can effectively identify intrusions. The proposed scheme is one of the recent enhancements of naive bayes algorithm. It solves the problem of independence by averaging all models generated by traditional one dependence estimator and is well suited for incremental learning. Empirical results show that proposed model based on SADE is efficient with low FAR and high DR. Syed Zuber Hussain | Prof. Avinash Sharma "A Novel Approach of Intrusion Detection System Through SADE in Data Mining" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18916.pdf
Effectiveness of Early Ambulation on Post Operative Recovery among the Women with Caesarean Section CS
Background Welcoming to the world where health starts early. Childbirth is seen as a vital life occasion. During the postnatal period women perceive so many complications. It's needed to restore women health status which...
Power Electronic Interface
Distributed energy units cannot be directly integrated into the power grid due to their inherently varying output. An interfacing technology is required. The power electronic interface is used for connecting distributed...
A Review Paper on WiVi Technology
Innovation is gaining exponential ground and is making numerous things less demanding. As the inventive reasoning of people is expanding each and every day, new techniques for remote systems administration have been adva...
Foray Spotlight System
This Project "Foray spotlight system" is used for protecting the Computer from Malware attacks. It is a real time project and system security software which is used to identify the malicious activities in a computer. Ma...
Review Paper on Study on Properties of Black Cotton Soil using Rice Husk Ash
The growing cost of traditional stabilizing agents and the need for the economical utilization of industrial and agricultural wastes for beneficial engineering purposes has prompted an investigation into the stabilizing...