Services and capabilities become computerized with the advancement in the technology, and an ever-increasing amount of business is conducted electronically. As a result of this advancement in technology, the threat of network security-attacks increases. We will detect network security attacks throug
Design and Implementation of Network Security Attack Detection System Using Data Mining Techniques
Services and capabilities become computerized with the advancement in the technology, and an ever-increasing amount of business is conducted electronically. As a result of this advancement in technology, the threat of network security-attacks increases. We will detect network security attacks through data mining techniques to learn the patterns in the network data and to detect the possible attacks in the network traffic. We will analyze different algorithms (e.g. SVM, K-means, Naïve Bayes, clustering, regression and CNN etc.) and will implement the best algorithm for network attack detection.
The new techniques in technology is introducing day by day with so new methods are adopted by attackers which result in great damage to networks. Our focus is to find out the preeminent technique in data mining for network security attack detection. In our project we will scrutinize the existing data mining algorithms for network attacks detection and implement the best algorithm for network security attack detection.
In implementation we design a system which will detect network security attacks. We will implement the best identified algorithm in our system for detection. The system is trained which monitors the ongoing network activities and network traffic. The malicious and unauthorized activity is mapped on the system. The detected threats and their categories are enlisted. The modules are coded for the automation processes in system.
System will warn (notification to user or admin) when such behavior is detected.
System will be placed centrally to capture all the incoming packets that are transmitted over the network. Data will be collect and send for pre-processing to remove the noise, irrelevant and missing attributes that are replaced. Then the pre-processed data will be analyzed and classified according to their severity measures. If the record is normal, then it does not require any more change or else it will be send for report generation to raise alarms. Based on the state of the data, alarms will be raised to make the administrator to handle the situation in advance. The attack is modeled so as to enable the classification of network data. All the above process will be continues as soon as the transmission starts.
| Item Name | Type | No. of Units | Per Unit Cost (in Rs) | Total (in Rs) |
|---|---|---|---|---|
| NIC cards | Equipment | 2 | 2500 | 5000 |
| Stationary | Miscellaneous | 10 | 200 | 2000 |
| Printing | Miscellaneous | 250 | 10 | 2500 |
| Others | Miscellaneous | 10 | 250 | 2500 |
| Total in (Rs) | 12000 |
e>In today's era, robots have taken the place of human beings and now robots are used at t...
INTRODUCTION: >>The ou...
Piezoelectric bimorphs have been used as a micro-gripper in many applications, but the sys...
It was estimated 2.5% of the population is disabled out which 7.5% are deaf. A friend who...
The aim of smart stick is to provide efficient navigation aid for the blind persons which...