Network Security Assignment | Network Intrusion

   

Added on  2020-05-16

6 Pages496 Words124 Views
Running head: NETWORK INTRUSIONNetwork Intrusion Name of the StudentName of the UniversityAuthor’s Note
Network Security Assignment | Network Intrusion_1
2NETWORK INTRUSION Literature reviewThe network intrusion detection system (IDE) is a system that helps in detecting variousattacks in the network system. IDS can be placed on any network that helps in collecting dataand information for providing security to the networks. Algorithms are required in order toperform detection of attacks in a network system. The Next Generation Intrusion DetectionExpert System (NIDES) has helped in maintaining the security of the network system by the useof the analytical and statistical model. The use of IDS has helped in maintaining the security ofthe data and information in the network server of the company [1]. This method comprises with detection rate of both known and unknown attacks isenhanced. There are some proposed intrusion detection algorithms including decision tree, one-class support vector machine and hybrid intrusion detection method. Decision tree method workson divided and conquers method with a recursive procedure. The primary application of theDecision tree algorithms are for providing data and divide into corresponding classes. Where Gain(S, A) is gain of set S after a split over the A attribute; Entropy(S) is theinformation entropy of set S.The entropy is as follows:A one-class support vector machine has been used by a various organization in order toprotect from network attacks. The algorithm of this system is as follows:
Network Security Assignment | Network Intrusion_2
3NETWORK INTRUSION Where w is vector orthogonal to hyperplane, n = [n1,.. nl] is vector of slack variablesused to penalize rejected instances, and q represent margin, i.e. distance of the hyperplane fromorigin. The detection rate of hybrid detection methods can be more than 99% withoutconsidering performance of first-class SVM model. Next step is testing step of algorithms usingthe MATLAB. The training time of proposed algorithms is measured to analyze the timecomplexity. Therefore, the use of these algorithms might help in maintaining the security of thenetwork system. Different viruses and malware are detected with the helped of the networkintrusion detection system in the network system. The use of the multi-core parallel system hashelped in creating a favourable condition for computing systems and its networks.
Network Security Assignment | Network Intrusion_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
A New Intrusion Detection System Based on Fast Learning Network and Particle Swarm Optimization Article 2022
|4
|743
|29

Artificial Intelligence-Based Intrusion Detection System
|12
|2988
|162

Data Mining and Machine Learning in Cybersecurity - Book by Sumeet Dua and Xian Du
|6
|1077
|55

Whale Optimization Algorithm-trained Artificial Neural Network Article 2022
|15
|8872
|22

Network Defence and Counter Measures
|3
|529
|308

Network Intrusion Detection Framework Analysis 2022
|11
|3856
|28