Rule-Based Decision Tree to Identify Malicious Traffic
Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.2, No. 5)Publication Date: 2013-05-30
Authors : Neha Jain; Dr Naveen Hemrajani;
Page : 1189-1192
Keywords : Data mining; IDS; malicious; intrusion.;
Abstract
Intrusion Detection Systems (IDSs) provide an important layer of security for computer systems and networks. An IDS’s task is to detect suspicious or unacceptable system and network activity and to alert a systems administrator to this activity. Since data mining is one of the most emerging fields, when we talk about intrusion detection systems. In this paper, decision tree technique is applied on a small set of network data to find out normal and abnormal behavior. The algorithm generates a decision tree model which differentiates the malicious traffic from normal traffic and then generates rules according to that tree, and incorporates the model’s logic into snort signatures or firewall rules.
Other Latest Articles
- Detection of Selfish Node in Manet using a Collaborative Watchdog
- Design and Verification of VLSI Based AES Crypto Core Processor Using Verilog HDL
- Removal of Organic Acids from Effluent via Freeze Crystallization
- An Improved NEH Algorithm Applied to Permutation Flow Shop Scheduling
- Performance Comparison of ADSDV and DSDV in MANET
Last modified: 2014-10-18 18:26:46