Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 10

Sri Venkateswara College of Engineering and Technology

RVS Nagar, Chittoor-517127


Affiliated to JNTU, Anantapur

Department of
Master of Computer Applications
NAME
:
ROLL
NO
:
SEMESTER
:
Review

M. Chandrakala
08781F0025
VI
First Review

Project Title
Integrating Layered Approach With Conditional
Random Field Intrusion Detection

Introduction
Intrusion detection system is a computer program that
attempts to perform intrusion intrusion detection by either
misuse or anomaly detection.
Intrusion detection: the problem of identifying individuals
who are using a computer system without authorization &
access to the system but are abusing their privileges
Intrusion detection is defined by SANS institute- art of
detecting inaccurate or anomalous activity
Intrusion detection is one of the high priority and challenging
task-n/w administrators and security professional

Introduction
Need to safeguard networks from know risks and take steps to
detect new and unseen attacks
Prime purpose- to detect as many attacks with minimum no. of
false alarms
A system that detects most of the attacks, gives few false alarms,
control large amount of data and fast to make real time decisions.
IDS classified as 2 ways based on data used for analysis
- Host based
- Network based

Introduction
IDS also classified as 2 types based on attack detection method
-Signature based
-Anomaly based
Hybrid system- advantages of signature and anomaly based systems
Here address two issues Accuracy and Efficiency
Finally show that the system is robust and handle noise data

Literature Survey
Title :
write the content

Literature Survey
Title:
write the content

Literature Survey
Title:

write the content wt u understand after reading the paper

Conclusion
For the intrusion detection we are applying the no.of
techniques. Each techniques have the advantages and
disadvantages compared to other method.
To detect the attacks and anomalous events we use the
datamining, NIDS, agentbased intrusion system and CRF
But now developing ICRF to detect new and unseen attack and
to provide efficiency and accuracy for the Network Activities

Thank
you

You might also like