Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/425338
Title: Enhancement of intrusion detection Techniques in distributed environment
Researcher: Ambikavathi C
Guide(s): Srivatsa S K
Keywords: Computer Science
Computer Science Theory and Methods
Engineering and Technology
Intrusion Detection Techniques
University: Sathyabama Institute of Science and Technology
Completed Date: 2021
Abstract: Intrusion detection systems (IDS) have been used in all types of newlinenetworking environments such as wired, wireless, ad-hoc networks etc. While it newlineis used in distributed networking environment such as grid or cloud computing, newlineperformance of IDS is degraded due to its dynamic nature, sharing of resources newlineand scalability features. Over recent years, researchers have been employing newlinevarious soft computing techniques for intrusion detection in distributed systems. newlineHowever, there exists a tradeoff between network performance and IDS newlineperformance, due to the massive amount of data for analyzing. Traditional IDS newlinehave to be tuned up to cope up with the features of distributed environment. This newlineresearch work focuses on upgrading the IDS methods to classify normal newlinebehavior and attacks. This proposed work aims to balance both IDS and network newlineperformance. IDS performance is enhanced in two modes and three phases. newlineSignature based and anomaly-based detection are the two modes. Integration, newlinepredictor selection and detection method are the three phases. newlineAll computing resources in the distributed system are cooperatively newlinemonitored by host based and network-based IDS models. Integration of IDS newlinemodels and methods (signature and anomaly based) strengthen intrusion newlineviii newlinedetection mechanism. Summarized intrusion report is generated from integrated newlinedesign. This report is used to update the existing signature database and prevents newlinefurther intrusion. Signature based detection is improved through selected rule set newlineconstruction and rules updation. Moreover, while detecting anomalies, predictor newlineselection phase highly influences detection accuracy. So predictors needed for newlineintrusion detection are selected using metrics, accuracy and Gini impurity . newlineDifferent classifiers such as SVM, C5.0 and random forest (RF) are tested to newlinefind the best classifier. RF yields better results than the other two classifiers.
Pagination: A5, VIII, 167
URI: http://hdl.handle.net/10603/425338
Appears in Departments:SICENCE AND HUMANITIES

Files in This Item:
File Description SizeFormat 
10.chapter 5.pdfAttached File314.89 kBAdobe PDFView/Open
11.chapter 6.pdf797.6 kBAdobe PDFView/Open
13.reference.pdf180.95 kBAdobe PDFView/Open
1 title.pdf71.98 kBAdobe PDFView/Open
2.certficate.pdf377.36 kBAdobe PDFView/Open
4.abstract.pdf74.38 kBAdobe PDFView/Open
5.table of contents.pdf160.8 kBAdobe PDFView/Open
6.chapter 1.pdf157.94 kBAdobe PDFView/Open
7.chapter 2.pdf258.65 kBAdobe PDFView/Open
80_recommendation.pdf81.08 kBAdobe PDFView/Open
8.chapter 3.pdf769.2 kBAdobe PDFView/Open
9.chapter 4.pdf839.19 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: