Skip to content
Scan a barcode
Scan
Added to your cart
Paperback Intrusive Attacks Filtering Technique for Secured Data Transmission Book

ISBN: 1805258990

ISBN13: 9781805258995

Intrusive Attacks Filtering Technique for Secured Data Transmission

Fortification of automated network systems from intrusive attacks is one of the major issues in the field of network security. The proposed work dealt with the process of identifying false positive attacks from various sources of network. In this anticipated research work we have predicted the decisive class label of a network packet for either accept or reject the request and this can be achieved by applying various data mining approaches with a novel steganographic approach, which helps to attain the prediction process. The simulation tests are conducted using KDD Cup 99 dataset and Arnasa Web Third International Knowledge Discovery and Data Mining Tools Competition and Medical consultation sity of the Basque Country. In network system environment the packet pattern is evaluated using signature and the packet is either accepted or rejected. The proposed methodology works on the Intrusion Detection System application and predicts the new requests on the basis of the existing knowledge and the identified knowledge is regularly updated in the Knowledge Base. The results show that the overall prediction accuracy for the occurrence and nonoccurrence of the false positive attacks on the network environment using the mining procedure is acceptable.

Recommended

Format: Paperback

Temporarily Unavailable

We receive fewer than 1 copy every 6 months.

Customer Reviews

0 customer rating | 0 review
There are currently no reviews. Be the first to review this work.
Copyright © 2025 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks ® and the ThriftBooks ® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured