Anomaly Detection
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
seminar projects crazy
Active In SP

Posts: 604
Joined: Dec 2008
13-06-2009, 04:19 PM

Network intrusion detection systems often rely on matching patterns that are gleaned from known attacks. While this method is reliable and rarely produces false alarms, it has the obvious disadvantage that it cannot detect novel attacks. An alternative approach is to learn a model of normal traffic and report deviations, but these anomaly models are typically restricted to modeling IP addresses and ports, and do not include the application payload where many attacks occur. We describe a novel approach to anomaly detection.

We extract a set of attributes from each event (IP packet or TCP connection),including strings in the payload, and induce a set of conditional rules which have a very low probability of being violated in a nonstationary model of the normal network traffic in the training data. In the 1999 DARPA intrusion detection evaluation data set, we detect about 60% of 190 attacks at a false alarm rate of 10 per day (100 total). We believe that anomaly detection can work because most attacks exploit software or configuration errors that escaped field testing, so are only exposed under unusual consitions.

Though our rule learning techniques are applied to network intrusion detection, they are general enough for detecting anomalies in other applications.
Use Search at wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: anomaly detection, seminars on network anomaly detection, seminar report on anomaly detection, anomalies detection seminar topics, seminar report anomaly detection, anomaly detection technical seminar,
Popular Searches: anomaly detection traffic, anomaly detection with snort, misuse detection vs anomaly detection, network traffic anomaly detector, parametric methods for anomaly detection in aggregate traffic ppt, ppt for an anomaly detection scheme for aodv networks, project on anomaly intrusion detection on java,

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  DETECTION OF WORMHOLE ATTACK IN MANET seminar ideas 5 1,350 26-08-2015, 12:37 AM
Last Post: Leenas
  Cut Detection in Wireless Sensor Networks pdf project girl 2 1,219 16-07-2015, 09:21 PM
Last Post: Guest
  analysis on credit card fraud detection methods ppt jaseelati 0 154 22-01-2015, 02:45 PM
Last Post: jaseelati
  credit card fraud detection using hidden markov model project download jaseelati 0 263 10-01-2015, 01:34 PM
Last Post: jaseelati
  analysis on credit card fraud detection methods ppt jaseelati 0 148 09-01-2015, 02:41 PM
Last Post: jaseelati
  credit card fraud detection ppt jaseelati 0 177 27-12-2014, 01:11 PM
Last Post: jaseelati
Lightbulb Fraud detection system for card transactions ffffff123456 0 376 26-04-2014, 05:19 AM
Last Post: ffffff123456
  Intrusion Detection: An Energy Efficient Approach in Heterogeneous WSN pdf study tips 1 924 09-02-2014, 05:40 PM
Last Post: Guest
  Design of an Error Detection and Data Recovery Architecture for Motion Estimation seminar projects maker 0 758 30-09-2013, 04:40 PM
Last Post: seminar projects maker
  Intrusion detection systems ( Download Full Seminar Report ) computer science crazy 8 15,168 28-09-2013, 03:01 PM
Last Post: Guest