Close
Login to Your Account
Faadooengineers

Results 1 to 3 of 3

Thread: A Method Of Tracing Intruders By Use Of Mobile Agents PDF Seminar & Presentation

  1. #1

    Pdf 32 A Method Of Tracing Intruders By Use Of Mobile Agents PDF Seminar & Presentation

    A network intrusion detection system (IDA) retrieves information related to intrusions from target systems across the network by using mobile agents. Simultaneously, the agents trace the intruders. IDA detects intrusions based on information collected and the route of intrusion. This paper mainly describes how IDA retrieves the information and traces the intrusions.



    Computer break-ins are mainly divided into two types: break-ins from outside the local area network (LAN) and those from inside LAN. However, it is rare in either case that intruders directly attack the target host from their own hosts. The reason for this is logical: intruders desire to conceal their origin. Intruders tend to attack the less -protected hosts first, gradually approaching hosts armed with stronger protection, ultimately working up to and reaching their target hosts. Commonly, administrators not only on the target hosts but also on the intermediate hosts do not notice the intrusion. Furthermore, the administrators cannot trace the origin of an intrusion after the network connection has closed even if the intrusion has been detected.

    Download the report attached below on A Method Of Tracing Intruders By Use Of Mobile Agents

    Attached Files for Direct Download
      File Name:
      File Size:
      212.4 KB
      Total Downloads:
      156
    * Click on the 'file icon' or 'file name' to start downloading

  2. #2

    Pdf 32 Re: A Method Of Tracing Intruders By Use Of Mobile Agents PDF Seminar & Presentation

    An Intelligent Intrusion Detection System
    Quickly increased complexity, openness, interconnection and interdependence have made computer systems more vulnerable and difficult to protect from malicious attacks. Network intrusion detection system plays a vital role in today's network. The attacks detection can be classified into either misuse or anomaly detection. The misuse detection can not detect unknown intrusions whereas the anomaly detection can give false positive. Combining the best feature of misuse and anomaly detection one intelligent intrusion detection system (IIDS) is proposed which is able to detect not only the known intrusions but also the unknown intrusions. For detecting the unknown intrusions the proper knowledge base is to be formed after preprocessing the packets captured from the network.

    The preprocessing is the combination of partitioning and feature extraction. The partitioning of packets is based on the network services and extraction of attack feature is added to the knowledge base. The preprocessed attacks can be classified by using mining classification which will be given to rule builder. Once the unknown intrusions are detected, that information can be added to misuse detector for further detection. The network intrusion detection system should beadaptable to all type of critical situations arise in network.

    Download detailed report on An Intelligent Intrusion Detection System from the attachment below
    Attached Files for Direct Download
      File Name:
      File Size:
      155.3 KB
      Total Downloads:
      25
    * Click on the 'file icon' or 'file name' to start downloading

  3. #3

    Pdf 32 Re: A Method Of Tracing Intruders By Use Of Mobile Agents PDF Seminar & Presentation

    Abstract :This paper describes a technique of applying Genetic Algorithm to network Intrusion Detection Systems.

    A brief overview of the Intrusion Detection System, genetic algorithm, rule based system and related detection techniques is presented.

    As the transmission of data over the internet increases, the need to protect connected systems also increases.
    Intrusion Detection Systems are the latest technology used for this purpose.

    Although the field of IDSs is still developing, the systems that do exist are still not complete, in the sense that they are not able to detect all types of intrusions.

    Some attacks which are detected by various tools available today cannot be detected by other products, depending on the types and methods that they are built on.

    Using a Genetic Algorithm is one of the methods that IDSs use to detect intrusions. They incorporate the concept of Darwin's theory and natural selection to detect intrusions.

    The focus of this paper is to introduce the application of GA, in order to improve the effectiveness of IDSs.

    Please find the following attachments "INTRUSION DETECTION SYSTEM USING RULE-BASED SYSTEMS" here......
    Attached Files for Direct Download
      File Name:
      File Size:
      169.4 KB
      Total Downloads:
      12
    * Click on the 'file icon' or 'file name' to start downloading

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  

Share anywhere and get download.

50%