0% found this document useful (0 votes)
23 views

Sample, Explore, Modify, Model, Assess

Neural networks can more accurately detect network intrusions compared to other methods because they can learn patterns in network data and identify anomalies. Key predictors for a neural network intrusion detection model include protocol, source and destination ports and addresses, packet length, and raw data. The SEMMA method involves sampling and exploring data, modifying and selecting features, modeling networks, and assessing model performance.

Uploaded by

ssvarma09
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views

Sample, Explore, Modify, Model, Assess

Neural networks can more accurately detect network intrusions compared to other methods because they can learn patterns in network data and identify anomalies. Key predictors for a neural network intrusion detection model include protocol, source and destination ports and addresses, packet length, and raw data. The SEMMA method involves sampling and exploring data, modifying and selecting features, modeling networks, and assessing model performance.

Uploaded by

ssvarma09
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

INTRODUCTION

CONTENT
The timely and accurate detection of computer and network system intrusions has
always been an elusive goal for system administrators and information security
researchers.
network intrusions are constantly changing because of individual approaches taken
by the attackers and regular changes in the software and hardware of the targeted
systems. Because of the infinite variety of attacks and attackers even a dedicated
effort to constantly update the rulebase of an expert system can never hope to
accurately identify the variety of intrusions.
The predictive analytics model technique that can be used to detect different
intrusions is nueral network. Artificial neural networks offer the potential to
resolve a number of the problems encountered by the other current approaches to
intrusion detection. Neural networks were specifically proposed to identify the
typical characteristics of system users and identify statistically significant
variations from the user's established behavior.
Predictors for bulding nueral network model
Protocol ID - The protocol associated with the event, (TCP = 0, UDP = 1, ICMP =
2)
Unknown =
3). Source Port The port number of the source. Destination Port The port
number of the destination. Source Address - The IP address of the source.
Destination Address - The IP address of the destination. ICMP Type The type
of the ICMP packet (Echo Request or Null). ICMP Code The code field from
the ICMP packet (None or Null). Raw Data Length The length of the data in the
packet. Raw Data - The data portion of the packet.
SEMMA Method which is -- sample, explore, modify, model, assess

CONCLUSION
OWN IDEAS

You might also like