Beruflich Dokumente
Kultur Dokumente
by
MANOJ KUMAR GANTAYAT
(manoj_gantayat@yahoo.co.in)
Roll # CS200117145
Under the Guidance of
MR. S.K.MEHER
INTRODUCTION
INTRUSION DETECTION SYSTEMS (IDS)
• Host-based IDS
• Network-based IDS
• Vulnerability-assessment IDS
COMPONENT OF Of IDS
NEURAL NETWORKS
2. Backpropagation Model
• Computer attack
• Typical characteristics of User
• Computer Viruses
• Malicious Software in Computer Network
NEGPAIM MODEL
NEURAL ENGINE
• Based Anomaly intrusion detection
• Establish profiles of normal user and compare user behaviors to
those profiles
• Investigation of total behaviors of the user
Disadvantages
• A statistical assumption is required
IMPLEMENTATION
• Uses Multi-layer Pecptron Network
First Stage :
1. Training a set of historical Data
2. Only once for each user
Second Stage:
1. Engine accept input Data
2. Compare with the historical Data
IMPLEMENTATION OF ANN
Disadvantages:
• Need for update to recognize the new attack
CONCLUSION
THANK YOU