IMPROVING USER - TO - ROOT AND REMOTE - TO - LOCAL ATTACKS USING GROWING HIERARCHICAL SELF ORGANIZING MAP

Abstract

Intrusion Detection System (IDS) protects a system by detecting “known” as well as “unknown” attacks and generates the alert for suspicious activities in the traffic. There are various approaches for IDS, but our survey was focused on IDS using Self Organi zing Map (SOM). Our survey shows that the existing IDS based on Self Organizing Map (SOM) have more computational time and poor detection rate for User - to - Root (U2R) and Remote - to - Local (R2L) attacks. So, our objective is to improve the detection rate of U2R and R2L attacks along with low computational time. From our survey we found that, Growing Hierarchical Self Organizing Map (GHSOM) is efficient due to its low computation time compared to traditional SOM model. To achieve our objective, our model uses GHSOM algorithm along with proper features selection to improve the performance of U2R and R2L attacks. Our empirical result indicates that, there is nearby 75% increase in the detection rate of U2R and R2L attacks by using GHSOM approach compare to SOM ap proach

Authors and Affiliations

KrutiChoksi , Bhavin Shah , Ompriya Kale

Keywords

Related Articles

 Speed Violation Detection System : A Review

 Traffic increased day by day due to ever growing technologies and Population.Roads are full with the vehicles all time.The traffic violation increased due to over traffic on roads.The reason is high speed of vehi...

 INVESTIGATIONS ON GROWTH KINETICS AND CHARACTERIZATIONS OF NONLINEAR OPTICAL MATERIAL: L-THREONINE SUCCINATE (LTS)

 L-threonine succinate (LTS), a new and efficient organic nonlinear optical (NLO) crystal, was successfully grown by slow evaporation technique. The grown crystal was then characterized using XRD and SEM-EDAX analy...

 CONFLICT MANAGEMENT SKILLS OF SCHOOL ADMINISTRATORS IN STATE UNIVERSITIES OF EASTERN VISAYAS

 The study assessed the conflict management among identified state universities in Region VIII during school year 2014 – 2015. A total of 130 administrators and 254 teachers from randomly sampled state Universities...

 MICROSTRUCTURE, PHASE TRANSFORMATIONS AND MECHANICAL PROPERTIES OF SOLUTION TREATED BI-MODAL  TITANIUM ALLOY

 The effect of heat treatment conditions on the microstructure, phase transformation and mechanical properties of Bimodal  titanium alloy was investigated. The heat treatment process comprises of solution treated...

 AVOID DATA MINING BASED ATTACKS IN RAIN-CLOUD

 Cloud computing is an umbrella term used to refer to Internet based development and services. It offers users the ability to connect to computing resources and access IT managed services with a previously unknown...

Download PDF file
  • EP ID EP163686
  • DOI -
  • Views 95
  • Downloads 0

How To Cite

KrutiChoksi, Bhavin Shah, Ompriya Kale (30). IMPROVING USER - TO - ROOT AND REMOTE - TO - LOCAL ATTACKS USING GROWING HIERARCHICAL SELF ORGANIZING MAP. International Journal of Engineering Sciences & Research Technology, 4(6), 611-618. https://www.europub.co.uk/articles/-A-163686