Sunday, December 29, 2019

Computer Security As A Critical Problem For Computer Systems

ABSTRACT Over the past decade computer networks have rapid growth, but the computer security became a critical problem for computer systems. Thus in the recent years various soft computing technique based methods were proposed to detects the growth of intrusion. Also many researchers have reported that the large set of pattern classifications and machine learning algorithms are trained and testing is made on the knowledge discovery data intrusion detection dataset is unsuccessful in finding the remote-to-local attacks and user-to root attacks. Moreover Hyperbolic Hopfield Neural Network(HHNN) based Intrusion Detection Systems (IDSs) detection stability, detection ratio, particularly low-frequent attacks are still required to be improved. Thus this paper proposes a new method known as K-Medoids-HNNN using the technique HHNN and K-Medoids clustering. This system achieves the higher intrusion detection rate, detection stability and less false positive rate. At first the proposed system implements the K-Medoids clustering technique on the various training subsets. Afterwards a mono HHNN model is trained using the different training subsets to detect the intrusion. The experimental results shows the K-Medoids-HHNN approach achieve better results rather than other framework. Keywords: Network Security, Intrusion Detection System, Hyperbolic Hopfield Neural Network, K-Medoids Clustering approach 1. INTRODUCTION In the last decades, the computer network systems are veryShow MoreRelatedSecurity And Risks Of Information Systems Essay1268 Words   |  6 Pages Most significant IS security and risk issues Information systems have developed rapidly over time and are being relied by more people. With the increasing reliability of Information Systems, businesses have adopted them a lot. Companies or businesses using Information System have an advantage in competitiveness and efficiency (Hilton, 2013). AIC uses an IS in its activities to enhance communication and collaboration. Due to the wide use, Information Systems have become an important part of everydayRead MoreThe Problem Of Cyber Warfare1531 Words   |  7 PagesIn computer science, there is a law named â€Å"Moore s Law† which states that every eighteen to twenty-four months, the number of transistors that can fit on a computer chip will double. This exponential growth of computing power has brought the human race to a point where we can almost no longer be completely human. While these advancements were done with strong and positive intentions, new security dangers have arisen along with them. Though a large chunk of the se dangers are studied and well knownRead MoreNetwork Support For Computer Network Security Problems Essay705 Words   |  3 PagesNetwork Support For Computer Network Security Problems By Daniel A Hughes | Submitted On September 12, 2011 Recommend Article Article Comments Print Article Share this article on Facebook Share this article on Twitter Share this article on Google+ Share this article on Linkedin Share this article on StumbleUpon Share this article on Delicious Share this article on Digg Share this article on Reddit Share this article on Pinterest Expert Author Daniel A Hughes Computer networking was inventedRead MoreThe International Telecommunication Union ( Itu ) Defines Cyber Security1551 Words   |  7 Pagescelestial bodies known in our solar system, our technology has literally and figuratively rocketed the human race into the future. While our technology becomes increasingly more advanced so does the ability to steal information from these systems. Cyber Security is one of the biggest threats our nation faces as we become more dependent on the use of technology in our day to day lives. What is Cyber Security? The International Telecommunication Union (ITU) defines Cyber Security as â€Å"Cybersecurity is the collectionRead MoreThe International Telecommunication Union ( Itu ) Defines Cyber Security1547 Words   |  7 Pagescelestial bodies known in our solar system, our technology has literally and figuratively rocketed the human race into the future. While our technology becomes increasingly more advanced so does the ability to steal information from these systems. Cyber Security is one of the biggest threats our nation faces as we become more dependent on the use of technology in our day to day lives. What is Cyber Security? The International Telecommunication Union (ITU) defines Cyber Security as â€Å"Cybersecurity is the collectionRead MoreInformation Technology And Its Impact On Our Lives1731 Words   |  7 Pages Abstract First thing that comes to mind when we talk about information technology (IT) security is computer security. In todays world, as we know technology is on the rise and more and more threats are accruing each day. By increasing and taking proper security measures in the world of evolving information technology has assist organizations in protecting they information assets. As society has grown more complex, the significance of sharing and securing the important resource of information hasRead MoreNuclear Facilities Are Among The Most Highly Secured Infrastructure1592 Words   |  7 Pagesinfrastructure in the nation. As analog system and instruments are becoming obsolete, the nuclear industry is starting to implement new digital systems throughout different facilities. In order to lower the risks of physical and cyber-attacks, nuclear facilities are adopting strict protection policy and practices. Despite the implementation of these safety measures, digital instruments and computer-b ased systems associated with physical protection system and control system inside the facilities can stillRead MoreSecuring And Protecting Information Protection1449 Words   |  6 Pagescommodity that individuals and global corporations use to grow financially, economically, and independently. The protection and security of the information is essential. One of the most vital foundations of protection information is the authentication process. The authentication process is utilized to protect computer and network systems against various types of security threats, such as password-cracking tools, password dictionary attacks, mistreatment of user access rights, and any potential unauthorizedRead MorePresident Reagan Signed Into Law A National Security Decision Directive1344 Words   |  6 Pages 1984 President Reagan signed into law a national security decision directive, NSDD-145, titled â€Å"National Policy on Telecommunications and Automated Information System Security†. Even at that time, the government officials understood that computers were susceptible to interception, unauthorized electronic access, and related form of technical espionage and exploitation. It was noted, that hostile agencies were â€Å"extensively† hacking into computers, and that terrorist groups and criminal enterprisesRead MoreA Research Project On Cyber Security1230 Words   |  5 Pages Cyber Security Introduction: - for my research project, I would like to explore about the cyber security measures. Cybersecurity covers the fundamental concepts underlying the construction of secure systems from the hardware to the software to the human computer interface, with the use of cryptography to secure interactions. These concepts are easily augmented with hands-on exercises involving relevant tools and techniques. We have different types of computer related crimes, cybercrimes

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.