Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/30460
Title: | Semantics aware intrusion detection Systems |
Researcher: | Srinivasan N |
Guide(s): | Vaidehi |
Keywords: | Fuzzy logic exist Genetic algorithms Neural networks |
Upload Date: | 10-Dec-2014 |
University: | Anna University |
Completed Date: | 01/04/2008 |
Abstract: | newlineAnomaly detection systems based on various soft computing newlinetechniques like Genetic algorithms Neural networks and Fuzzy logic exist in newlinethe literature However they are not as successful as misuse detection newlinesystems due to various parameters like detection time accuracy newlineimplementation delay etc Hence a Genetic aided fuzzy based anomaly newlinedetection system is proposed in this thesis Such an anomaly detector shows newlinebetter accuracy at a relatively lesser detection time A similar study came in newlinehandy by modeling the detection of attacks by a misuse detection system newlineusing colored petrinets thus experimenting on commercially available misuse newlinedetectors like Snort and Bro When all the above systems were designed and aimed to operate at newlinethe Network layer a need for an intrusion detection system that operates at the newlineapplication layer arises as these network layer detectors do not aim at newlinedetecting protocol specific attacks The need for such a system at the newlineapplication layer is more relevant as they are exposed to maximum newlineabstraction and the state of art solutions are incapable of detecting misuses in newlinethese layers This thesis explores the prospects of having a misuse detection newlinesystem that operates on the application layer protocols like HTTP FTP etc It newlineis well known that all misuse detection systems work on the concept of newlinestoring signatures that represent an attack pattern or misuse which are later newlinematched inline using trivial pattern matching algorithms with the incoming newlinenetwork stream for detection However the forms of attacks that are detected newlineare restricted to those that have a syntactic match with the signatures only in newlinethe network layer newline |
Pagination: | xv, 132p. |
URI: | http://hdl.handle.net/10603/30460 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 13.18 kB | Adobe PDF | View/Open |
02_certificate.pdf | 5.62 kB | Adobe PDF | View/Open | |
03_abstract.pdf | 8.94 kB | Adobe PDF | View/Open | |
04_acknowledgement.pdf | 6.96 kB | Adobe PDF | View/Open | |
05_content.pdf | 57.11 kB | Adobe PDF | View/Open | |
06_chapter1.pdf | 323.94 kB | Adobe PDF | View/Open | |
07_chapter2.pdf | 403.1 kB | Adobe PDF | View/Open | |
08_chapter3.pdf | 563.45 kB | Adobe PDF | View/Open | |
09_chapter4.pdf | 287.78 kB | Adobe PDF | View/Open | |
10_chapter5.pdf | 407.6 kB | Adobe PDF | View/Open | |
11_chapter6.pdf | 10.34 kB | Adobe PDF | View/Open | |
12_reference.pdf | 44.84 kB | Adobe PDF | View/Open | |
13_publication.pdf | 9.14 kB | Adobe PDF | View/Open | |
14_vitae.pdf | 5.31 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: