Title of article :
A Novel Approach for Identifying Intruder based on Multiple Approaches
Author/Authors :
Amit Kumar Sharma، نويسنده , , Mr. Naveen Hemrajani، نويسنده ,
Issue Information :
روزنامه با شماره پیاپی سال 2010
Abstract :
The paper reviews of research to identify the intrusion and intruder, most computers authenticate user ID and password before users canlogin these systems. However, danger soon comes if the two items are known to hackers. In this paper, we propose a system that finds who intrudeand how they intrude in to the system. The information about the intruder and their saved information in the data warehouse to the other locationwithout knowing to the intruder and in this duration server will find the information about the intruder. In future when intruder again enter in thenetwork then caught and show the information about him and last time you enter in this network. For this technique I can reduce the network attack. And find more type of Network intrusion Detecting System with using data mining Approach. Our experimental results show that the recognitionaccuracy of students of computer science department is up to 99%.
Keywords :
Network intrusion detection , Honeypots , Data mining , User authentication
Journal title :
International Journal of Advanced Research in Computer Science
Journal title :
International Journal of Advanced Research in Computer Science