CLICK HERE TO EARN MONEY FREE

Monday, January 16, 2012

PAPER IN INTRUSION DETECTION THROUGH “DNA CHARACTERIZATION”


INTRUSION DETECTION THROUGH
“DNA CHARACTERIZATION”





Intrusion Prevention: This scheme may be utilized to prevent viruses, malicious software and unauthorized users are prevented from entering our computer. Protection of this nature can be accomplished with the use of
> Password controlled access.
> Software signature recognition.
> Firewalls.
But, inevitably the best intrusion prevention systems fail due to the continuous evolution of malicious software and the persistence of unauthorized users.

Intrusion Detection: Due to the shortcomings present in the above method, this defence scheme gains importance. In this paper, we define a unique method called COMPUTER DNA CHARACTERIZATION for determining whether our computer is being intruded or attacked through networks.



1.1   Why we use COMPUTER DNA CHARACTERIZATION?

The benefits of decoding the human genome are to have a better understanding of diseases and efficient development of drugs and techniques that will treat the disease. Thus, early detection of diseases will be possible.Computer characteristics such as network traffic, modification of system files, and modification of data files are determined by the computer’s DNA sequence. As with humans, the initial DNA sequences are predetermined on inception and ideally do not cause the system any harm. But any user trying to intrude the system brings an abnormal change in the generated DNA sequence, leading to an early intrusion detection, which limits the damage and quickens the process of recovery. https://www.llnl.gov/str/June05/gifs/Aufderheide4.jpg
A  COMPUTER  ILLUSTRATION
2.     COMPUTERNETWORK TRAFFICDNASEQUENCES
2.1. Base Structure Definition
                  Before a computer DNA sequence can be generated, the structure of the base pairs must first be determined. There are two base structures:
2.1.1. Fundamental Base Structure:
         The first base structure contains   only three pieces of information namely, amount of TCP, UDP, and ICMP traffic over a certain time period. Sequences generated from this base only present the most basic information about a computer system’s network activity. A sequence of this type is illustrated in Figure 1.
 CLICK HERE TO
                              DOWNLOAD FULL PAPER

0 comments:

Post a Comment

 

TEKONOLOGY Copyright © 2011 -- Template created by TEKONOLOGY -- Powered by Blogger