SlideShare une entreprise Scribd logo
1  sur  18
NETWORK SECURITY USING
DATA MINING CONCEPTS
A
SEMINAR ON:
SUBMITTED TO:
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
INSTITUTE OF TECHNOLOGY AND MANAGEMENT, GIDA, GORAKHPUR
GUIDE: MR. NAFEES AKHTER FAROOQUI BY: JAIDEEP GHOSH
OUTLINE
INTRODUCTION
SECURITY THREATS
DATA MINING
NETWORK SECURITY
INTEGRATION OF DATA MINING CONCEPTS
WITH NETWORK SECURITY
SYSTEM STRUCTURE
ADVANTAGES
CONCLUSION
INSTITUTE OF TECHNOLOGY AND
MANAGEMENT
INTRODUCTION
 Network Security is a major part of a network that needs
to be maintained because information is being passed
between computers etc. and is very vulnerable to attack.
 Data Mining is the process of extraction of
required/specific information from data in database.
 Data mining is integrated with network security and can
be used with various security tools as well as hacking
tool.
INSTITUTE OF TECHNOLOGY AND
MANAGEMENT
SECURITY THREATS
TYPES OF ATTACK ON NETWORK
ACTIVE ATTACK PASSIVE ATTACK
An event which can target the security region with the
intension to harm/access the system without
authentication is called Security Threats.
Attack is an action is taken against a target with the
intension of doing harm.
INSTITUTE OF TECHNOLOGY AND
MANAGEMENT
SECURITY THREATS
 ACTIVE ATTACK: An active attack attempts to alter
system resources or affect their operations.
 PASSIVE ATTACK: A passive attack attempts to learn or
make use of information from the system but does not
affects system resources.
Some other attacks are:
 DISTRIBUTED ATTACK
 INSIDER ATTACK
 CLOSE-IN ATTACK
 PHISHING ATTACK
 HIJACK ATTACK
 PASSWORD ATTACK INSTITUTE OF TECHNOLOGY AND
MANAGEMENT
SECURITY THREATS
VIRUSES AND WORMS
TROJAN HORSES
SPAM
PHISHING
PACKET SNIFFERS
MALICIOUSLY CODED WEBSITES
PASSWORD ATTACKS
HARDWARE ATTACKS AND RESIDUAL DATA FRAGMENTS
SHARED COMPUTERS
ZOMBIE COMPUTERS AND BOTNETS
INSTITUTE OF TECHNOLOGY AND
MANAGEMENT
DATA MINING
 Data Mining is the process of extraction of
required/specific information from data in database.
 Data Mining is the process of analysing data from
different perspectives and summarising it into useful
information.
 Data Mining is the process of finding co-relations or
patterns among several fields in large relational
database.
INSTITUTE OF TECHNOLOGY AND
MANAGEMENT
DATA MINING FOR NETWORK SECURITY
Data Mining is being applied to problems such as intrusion
detection and auditing.
 ANAMOLY DETECTION TECHNIQUES could be used to
detect unusual patterns and behaviours.
 LINK ANALYSIS may be used to trace self propagating
malicious code to its authors.
 CLASSIFICATION may be used to group various cyber
attacks and then use the profiles to detect an attack when
it occurs.
 PREDICTION may be used to determine potential future
attacks depending in a way on information learnt about
terrorist through E-Mail and Phone conversations.
INSTITUTE OF TECHNOLOGY AND
MANAGEMENT
DATA MINING FOR INTRUSION DETECTION
An Intrusion can be defined as any set of action that attempt to
compromise the integrity, confidentiality or availability of a
resource.
TECHNIQUES OF IDS
Anomaly Detection System Misuse Detection System
INSTITUTE OF TECHNOLOGY AND
MANAGEMENT
DATA MINING FOR INTRUSION DETECTION
TYPES OF IDS:
Host Based
Detects attacks against a single host.
Distributed IDS
Detects attacks involving multiple hosts.
Network Based IDS
Detects attacks from any network.
INSTITUTE OF TECHNOLOGY AND
MANAGEMENT
NETWORK SECURITY
Network Security consist of the policies adopted to prevent
and monitor unauthorized access, misuse, modification or
Daniel of computer networks and network accessible
resources.
INSTITUTE OF TECHNOLOGY AND
MANAGEMENT
PASSWORD DISCOVERY TABLE
# OF
CHARACTER
POSSIBLE
COMBINATION
1 36
2 1300
5 6 Crore
HUMAN COMPUTER
3 Min .000018 Sec
2 Hours .00065 Sec
10 Years 30 Sec
 Possible character includes the letter A-Z and Numbers 0-9.
 Human discovery assumes 1 try in every second.
 Computer discovery assumes 1 Million tries per second.
 Average time assumes the password would be discovered in approximately half
the time it would take to try all possible combinations.
INSTITUTE OF TECHNOLOGY AND
MANAGEMENT
ARCHITECTURE OF
DATAMINING IN ETHICAL HACKING TOOLS
DATA SOURCE
1
DATA SOURCE
2
DATA SOURCE
3
DATA
WAREHOUSE
ETHICAL
HACKING
TOOLS
ETL
TOOL
Fig:1 WORKING ARCHITECTURE OF DATA MINING IN ETHICAL HACKING TOOLS
INSTITUTE OF TECHNOLOGY AND
MANAGEMENT
WORM DETECTION
Worms are self replicating program, that exploits software
vulnerability on a victim or remotely infects other victims.
TYPES OF WORMS:
 E-mail Worms
 Instant Messaging Worms
 Internet Worms
 File Sharing Network Worms
INSTITUTE OF TECHNOLOGY AND
MANAGEMENT
ADVANTAGES
 Consumes very less time in various network tools for
decrypting password and other information.
 Easy to implement such system.
 Helps to record unwanted and unauthorized access on
any network.
INSTITUTE OF TECHNOLOGY AND
MANAGEMENT
CONCLUSION
The result of mining in network security may be to discover
following type of new information.
INSTITUTE OF TECHNOLOGY AND
MANAGEMENT
 Protection from unauthorized access.
 Blocking of IP in case when wrong password attempted several
times.
 Helps in prevention from various terrorist attacks by recording
their information.
 Concept can be implemented in various system like: IDS, WORM
DETECTION etc.
 Helps in Brute Force attack, Password cracking etc.
THANK YOU

Contenu connexe

Tendances

Comparative Analysis: Network Forensic Systems
Comparative Analysis: Network Forensic SystemsComparative Analysis: Network Forensic Systems
Comparative Analysis: Network Forensic Systemsijsrd.com
 
Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemAffine Analytics
 
Data mining in Cyber security
Data mining in Cyber securityData mining in Cyber security
Data mining in Cyber securityPsychoCryGaming
 
Cyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopCyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopDigit Oktavianto
 
Hybrid Intrusion Detection System using Weighted Signature Generation over An...
Hybrid Intrusion Detection System using Weighted Signature Generation over An...Hybrid Intrusion Detection System using Weighted Signature Generation over An...
Hybrid Intrusion Detection System using Weighted Signature Generation over An...Editor IJMTER
 
Data mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaData mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaMaribel García Arenas
 
An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...Editor IJMTER
 
Telesoft Cyber Threat Hunting Infographic
Telesoft Cyber Threat Hunting InfographicTelesoft Cyber Threat Hunting Infographic
Telesoft Cyber Threat Hunting InfographicSarah Chandley
 
Machine learning approach to anomaly detection in cyber security
Machine learning approach to anomaly detection in cyber securityMachine learning approach to anomaly detection in cyber security
Machine learning approach to anomaly detection in cyber securityIAEME Publication
 
Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013ijcsbi
 
Survey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detectionSurvey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detectioncsandit
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security applicationbharatsvnit
 
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...IJCSIS Research Publications
 
Threat Hunting 101: Intro to Threat Detection and Incident Response
Threat Hunting 101: Intro to Threat Detection and Incident ResponseThreat Hunting 101: Intro to Threat Detection and Incident Response
Threat Hunting 101: Intro to Threat Detection and Incident ResponseInfocyte
 
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...IJCSIS Research Publications
 
A Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemAM Publications
 

Tendances (20)

DM for IDS
DM for IDSDM for IDS
DM for IDS
 
Comparative Analysis: Network Forensic Systems
Comparative Analysis: Network Forensic SystemsComparative Analysis: Network Forensic Systems
Comparative Analysis: Network Forensic Systems
 
Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection system
 
Data mining in Cyber security
Data mining in Cyber securityData mining in Cyber security
Data mining in Cyber security
 
Cyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopCyber Threat Hunting Workshop
Cyber Threat Hunting Workshop
 
Bt33430435
Bt33430435Bt33430435
Bt33430435
 
Hybrid Intrusion Detection System using Weighted Signature Generation over An...
Hybrid Intrusion Detection System using Weighted Signature Generation over An...Hybrid Intrusion Detection System using Weighted Signature Generation over An...
Hybrid Intrusion Detection System using Weighted Signature Generation over An...
 
Gp3112671275
Gp3112671275Gp3112671275
Gp3112671275
 
Data mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaData mining in security: Ja'far Alqatawna
Data mining in security: Ja'far Alqatawna
 
4777.team c.final
4777.team c.final4777.team c.final
4777.team c.final
 
An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...
 
Telesoft Cyber Threat Hunting Infographic
Telesoft Cyber Threat Hunting InfographicTelesoft Cyber Threat Hunting Infographic
Telesoft Cyber Threat Hunting Infographic
 
Machine learning approach to anomaly detection in cyber security
Machine learning approach to anomaly detection in cyber securityMachine learning approach to anomaly detection in cyber security
Machine learning approach to anomaly detection in cyber security
 
Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013
 
Survey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detectionSurvey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detection
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security application
 
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
 
Threat Hunting 101: Intro to Threat Detection and Incident Response
Threat Hunting 101: Intro to Threat Detection and Incident ResponseThreat Hunting 101: Intro to Threat Detection and Incident Response
Threat Hunting 101: Intro to Threat Detection and Incident Response
 
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
 
A Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection System
 

En vedette

Data mining cyber security
Data mining   cyber securityData mining   cyber security
Data mining cyber securityAmir Razmjou
 
Network Security & Cryptography
Network Security & CryptographyNetwork Security & Cryptography
Network Security & CryptographyDr. Himanshu Gupta
 
Artificial Intelligence: Data Mining
Artificial Intelligence: Data MiningArtificial Intelligence: Data Mining
Artificial Intelligence: Data MiningThe Integral Worm
 
Intruders
IntrudersIntruders
Intruderstechn
 
Data mining seminar report
Data mining seminar reportData mining seminar report
Data mining seminar reportmayurik19
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9koolkampus
 
Data Network Security
Data Network SecurityData Network Security
Data Network SecurityAtif Rehmat
 
Data Warehousing and Data Mining
Data Warehousing and Data MiningData Warehousing and Data Mining
Data Warehousing and Data Miningidnats
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 

En vedette (10)

Data mining cyber security
Data mining   cyber securityData mining   cyber security
Data mining cyber security
 
Network Security & Cryptography
Network Security & CryptographyNetwork Security & Cryptography
Network Security & Cryptography
 
Artificial Intelligence: Data Mining
Artificial Intelligence: Data MiningArtificial Intelligence: Data Mining
Artificial Intelligence: Data Mining
 
Intruders
IntrudersIntruders
Intruders
 
Data mining seminar report
Data mining seminar reportData mining seminar report
Data mining seminar report
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9
 
Data Network Security
Data Network SecurityData Network Security
Data Network Security
 
Data mining
Data miningData mining
Data mining
 
Data Warehousing and Data Mining
Data Warehousing and Data MiningData Warehousing and Data Mining
Data Warehousing and Data Mining
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 

Similaire à Network security using data mining concepts

Internship ankita jain
Internship ankita jainInternship ankita jain
Internship ankita jainAnkita Jain
 
Detecting and Preventing Attacks Using Network Intrusion Detection Systems
Detecting and Preventing Attacks Using Network Intrusion Detection SystemsDetecting and Preventing Attacks Using Network Intrusion Detection Systems
Detecting and Preventing Attacks Using Network Intrusion Detection SystemsCSCJournals
 
D03302030036
D03302030036D03302030036
D03302030036theijes
 
Peripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network SecurityPeripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network SecurityIJRES Journal
 
Enhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 datasetEnhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 datasetijctet
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdfahmed53254
 
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...ijsptm
 
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...ClaraZara1
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundohdbundo
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and ToolsKaran Bhandari
 
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief inCYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief inOllieShoresna
 
Network and web security
Network and web securityNetwork and web security
Network and web securityNitesh Saitwal
 
Three level intrusion detection system based on conditional generative advers...
Three level intrusion detection system based on conditional generative advers...Three level intrusion detection system based on conditional generative advers...
Three level intrusion detection system based on conditional generative advers...IJECEIAES
 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi SecurityIRJET Journal
 
A CASE STUDY ON VARIOUS NETWORK SECURITY TOOLS
A CASE STUDY ON VARIOUS NETWORK SECURITY TOOLSA CASE STUDY ON VARIOUS NETWORK SECURITY TOOLS
A CASE STUDY ON VARIOUS NETWORK SECURITY TOOLSKatie Robinson
 

Similaire à Network security using data mining concepts (20)

Internship ankita jain
Internship ankita jainInternship ankita jain
Internship ankita jain
 
Detecting and Preventing Attacks Using Network Intrusion Detection Systems
Detecting and Preventing Attacks Using Network Intrusion Detection SystemsDetecting and Preventing Attacks Using Network Intrusion Detection Systems
Detecting and Preventing Attacks Using Network Intrusion Detection Systems
 
D03302030036
D03302030036D03302030036
D03302030036
 
Peripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network SecurityPeripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network Security
 
Enhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 datasetEnhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 dataset
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
Network security
Network security Network security
Network security
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
 
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
 
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
 
E04 05 2841
E04 05 2841E04 05 2841
E04 05 2841
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundo
 
Data security
Data securityData security
Data security
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and Tools
 
Network srcurity
Network srcurityNetwork srcurity
Network srcurity
 
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief inCYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
 
Network and web security
Network and web securityNetwork and web security
Network and web security
 
Three level intrusion detection system based on conditional generative advers...
Three level intrusion detection system based on conditional generative advers...Three level intrusion detection system based on conditional generative advers...
Three level intrusion detection system based on conditional generative advers...
 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi Security
 
A CASE STUDY ON VARIOUS NETWORK SECURITY TOOLS
A CASE STUDY ON VARIOUS NETWORK SECURITY TOOLSA CASE STUDY ON VARIOUS NETWORK SECURITY TOOLS
A CASE STUDY ON VARIOUS NETWORK SECURITY TOOLS
 

Dernier

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Dernier (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Network security using data mining concepts

  • 1. NETWORK SECURITY USING DATA MINING CONCEPTS A SEMINAR ON: SUBMITTED TO: DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING INSTITUTE OF TECHNOLOGY AND MANAGEMENT, GIDA, GORAKHPUR GUIDE: MR. NAFEES AKHTER FAROOQUI BY: JAIDEEP GHOSH
  • 2.
  • 3. OUTLINE INTRODUCTION SECURITY THREATS DATA MINING NETWORK SECURITY INTEGRATION OF DATA MINING CONCEPTS WITH NETWORK SECURITY SYSTEM STRUCTURE ADVANTAGES CONCLUSION INSTITUTE OF TECHNOLOGY AND MANAGEMENT
  • 4. INTRODUCTION  Network Security is a major part of a network that needs to be maintained because information is being passed between computers etc. and is very vulnerable to attack.  Data Mining is the process of extraction of required/specific information from data in database.  Data mining is integrated with network security and can be used with various security tools as well as hacking tool. INSTITUTE OF TECHNOLOGY AND MANAGEMENT
  • 5. SECURITY THREATS TYPES OF ATTACK ON NETWORK ACTIVE ATTACK PASSIVE ATTACK An event which can target the security region with the intension to harm/access the system without authentication is called Security Threats. Attack is an action is taken against a target with the intension of doing harm. INSTITUTE OF TECHNOLOGY AND MANAGEMENT
  • 6. SECURITY THREATS  ACTIVE ATTACK: An active attack attempts to alter system resources or affect their operations.  PASSIVE ATTACK: A passive attack attempts to learn or make use of information from the system but does not affects system resources. Some other attacks are:  DISTRIBUTED ATTACK  INSIDER ATTACK  CLOSE-IN ATTACK  PHISHING ATTACK  HIJACK ATTACK  PASSWORD ATTACK INSTITUTE OF TECHNOLOGY AND MANAGEMENT
  • 7. SECURITY THREATS VIRUSES AND WORMS TROJAN HORSES SPAM PHISHING PACKET SNIFFERS MALICIOUSLY CODED WEBSITES PASSWORD ATTACKS HARDWARE ATTACKS AND RESIDUAL DATA FRAGMENTS SHARED COMPUTERS ZOMBIE COMPUTERS AND BOTNETS INSTITUTE OF TECHNOLOGY AND MANAGEMENT
  • 8. DATA MINING  Data Mining is the process of extraction of required/specific information from data in database.  Data Mining is the process of analysing data from different perspectives and summarising it into useful information.  Data Mining is the process of finding co-relations or patterns among several fields in large relational database. INSTITUTE OF TECHNOLOGY AND MANAGEMENT
  • 9. DATA MINING FOR NETWORK SECURITY Data Mining is being applied to problems such as intrusion detection and auditing.  ANAMOLY DETECTION TECHNIQUES could be used to detect unusual patterns and behaviours.  LINK ANALYSIS may be used to trace self propagating malicious code to its authors.  CLASSIFICATION may be used to group various cyber attacks and then use the profiles to detect an attack when it occurs.  PREDICTION may be used to determine potential future attacks depending in a way on information learnt about terrorist through E-Mail and Phone conversations. INSTITUTE OF TECHNOLOGY AND MANAGEMENT
  • 10. DATA MINING FOR INTRUSION DETECTION An Intrusion can be defined as any set of action that attempt to compromise the integrity, confidentiality or availability of a resource. TECHNIQUES OF IDS Anomaly Detection System Misuse Detection System INSTITUTE OF TECHNOLOGY AND MANAGEMENT
  • 11. DATA MINING FOR INTRUSION DETECTION TYPES OF IDS: Host Based Detects attacks against a single host. Distributed IDS Detects attacks involving multiple hosts. Network Based IDS Detects attacks from any network. INSTITUTE OF TECHNOLOGY AND MANAGEMENT
  • 12. NETWORK SECURITY Network Security consist of the policies adopted to prevent and monitor unauthorized access, misuse, modification or Daniel of computer networks and network accessible resources. INSTITUTE OF TECHNOLOGY AND MANAGEMENT
  • 13. PASSWORD DISCOVERY TABLE # OF CHARACTER POSSIBLE COMBINATION 1 36 2 1300 5 6 Crore HUMAN COMPUTER 3 Min .000018 Sec 2 Hours .00065 Sec 10 Years 30 Sec  Possible character includes the letter A-Z and Numbers 0-9.  Human discovery assumes 1 try in every second.  Computer discovery assumes 1 Million tries per second.  Average time assumes the password would be discovered in approximately half the time it would take to try all possible combinations. INSTITUTE OF TECHNOLOGY AND MANAGEMENT
  • 14. ARCHITECTURE OF DATAMINING IN ETHICAL HACKING TOOLS DATA SOURCE 1 DATA SOURCE 2 DATA SOURCE 3 DATA WAREHOUSE ETHICAL HACKING TOOLS ETL TOOL Fig:1 WORKING ARCHITECTURE OF DATA MINING IN ETHICAL HACKING TOOLS INSTITUTE OF TECHNOLOGY AND MANAGEMENT
  • 15. WORM DETECTION Worms are self replicating program, that exploits software vulnerability on a victim or remotely infects other victims. TYPES OF WORMS:  E-mail Worms  Instant Messaging Worms  Internet Worms  File Sharing Network Worms INSTITUTE OF TECHNOLOGY AND MANAGEMENT
  • 16. ADVANTAGES  Consumes very less time in various network tools for decrypting password and other information.  Easy to implement such system.  Helps to record unwanted and unauthorized access on any network. INSTITUTE OF TECHNOLOGY AND MANAGEMENT
  • 17. CONCLUSION The result of mining in network security may be to discover following type of new information. INSTITUTE OF TECHNOLOGY AND MANAGEMENT  Protection from unauthorized access.  Blocking of IP in case when wrong password attempted several times.  Helps in prevention from various terrorist attacks by recording their information.  Concept can be implemented in various system like: IDS, WORM DETECTION etc.  Helps in Brute Force attack, Password cracking etc.