Practical Intrusion Detection Handbook
Practical Intrusion Detection Handbook
PHP and MySQL Web Development
Information Visualization and Visual Data Mining
IEEE Transactions on Visualization and Computer Graphics
Hi-index | 0.00 |
An Intrusion Detection System (IDS) assists in managing threats and vulnerabilities in a computer network. A data mining based IDS helps in differentiating intrusions from normal activity by automatically detecting anomalous patterns in large volumes of audit data on packet traces. In this work, a Web-based data mining system to analyze intrusions is presented. The system is implemented using all freeware available in public domain. The system finds anomalous activity that uncovers a real attack process and identifies long and ongoing patterns. It can be used to analyze host-based traffic features, time-based traffic features, protocol-based traffic features, and the associated intrusions. With the help of this system, rules can be generated to capture the behavior of the intrusions as well as of normal activity. The proposed system can be used on a small network for educational and training purposes as well as students in networking or security-related courses can be inspired to develop similar tools for their graduate or undergraduate projects.